Feng Liu
Orcid: 0000-0002-7828-2090Affiliations:
- Chinese Academy of Sciences, State Key Laboratory of Information Security, Institute of Software, Beijing, China
According to our database1,
Feng Liu
authored at least 81 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Stories behind decisions: Towards interpretable malware family classification with hierarchical attention.
Comput. Secur., 2024
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Poster: Enhancing Network Traffic Analysis with Pre-trained Side-channel Feature Imputation.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
ACM Trans. Multim. Comput. Commun. Appl., February, 2023
Proceedings of the Science of Cyber Security - 5th International Conference, 2023
Proceedings of the Science of Cyber Security - 5th International Conference, 2023
Proceedings of the Computational Science - ICCS 2023, 2023
Proceedings of the IEEE Global Communications Conference, 2023
2022
Proceedings of the IEEE Smartworld, 2022
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
High-Efficient and Few-shot Adaptive Encrypted Traffic Classification with Deep Tree.
Proceedings of the IEEE Military Communications Conference, 2022
Proceedings of the 26th International Conference on Pattern Recognition, 2022
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
2021
Proceedings of the Science of Cyber Security - Third International Conference, 2021
HSLF: HTTP Header Sequence Based LSH Fingerprints for Application Traffic Classification.
Proceedings of the Computational Science - ICCS 2021, 2021
2020
Int. J. Digit. Crime Forensics, 2020
What You See Is Not What You Get: Towards Deception-Based Data Moving Target Defense.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020
Proceedings of the 2020 IEEE International Conference on Web Services, 2020
2019
A new visual evaluation criterion of visual cryptography scheme for character secret image.
Multim. Tools Appl., 2019
IET Inf. Secur., 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Modeling an Information-Based Advanced Persistent Threat Attack on the Internal Network.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
A white-box AES-like implementation based on key-dependent substitution-linear transformations.
Multim. Tools Appl., 2018
A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control.
Int. J. Digit. Crime Forensics, 2018
Sci. China Inf. Sci., 2018
Characterizing the Optimal Attack Strategy Decision in Cyber Epidemic Attacks with Limited Resources.
Proceedings of the Science of Cyber Security - First International Conference, 2018
2017
New insight into linear algebraic technique to construct visual cryptography scheme for general access structure.
Multim. Tools Appl., 2017
Int. J. Digit. Crime Forensics, 2017
IET Inf. Secur., 2017
Finite Fields Their Appl., 2017
Des. Codes Cryptogr., 2017
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017
2016
An Algorithm for Counting the Number of 2<sup>n</sup>-Periodic Binary Sequences with Fixed k-Error Linear Complexity.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
The Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity.
Proceedings of the Information Security Practice and Experience, 2016
The Linear Complexity and 2-Error Linear Complexity Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed Hamming Weight.
Proceedings of the Information and Communications Security - 18th International Conference, 2016
2015
Proceedings of the Image and Video Technology - PSIVT 2015 Workshops, 2015
An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015
Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications, Second Edition
Springer, ISBN: 978-3-319-23473-1, 2015
2014
Trans. Data Hiding Multim. Secur., 2014
Trans. Data Hiding Multim. Secur., 2014
Signal Process., 2014
Proceedings of the 2014 IEEE International Symposium on Multimedia, 2014
Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications
Springer, ISBN: 978-3-319-09644-5, 2014
2013
J. Syst. Softw., 2013
Proceedings of the Information Security, 16th International Conference, 2013
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
Proceedings of the Information Theoretic Security - 7th International Conference, 2013
2012
J. Vis. Commun. Image Represent., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
Proceedings of the Information Security Practice and Experience, 2012
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
2011
IEEE Trans. Inf. Forensics Secur., 2011
Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners.
IET Inf. Secur., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011
Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attacks.
Proceedings of the Trusted Systems - Third International Conference, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
2010
IEEE Trans. Inf. Forensics Secur., 2010
Inf. Process. Lett., 2010
IACR Cryptol. ePrint Arch., 2010
2009
2008
J. Commun. Networks, 2008