Feng Liu

Orcid: 0000-0002-7828-2090

Affiliations:
  • Chinese Academy of Sciences, State Key Laboratory of Information Security, Institute of Software, Beijing, China


According to our database1, Feng Liu authored at least 81 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Stories behind decisions: Towards interpretable malware family classification with hierarchical attention.
Comput. Secur., 2024

Optimal Defense Strategy for Multi-agents Using Value Decomposition Networks.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

CAFE: Robust Detection of Malicious Macro based on Cross-modal Feature Extraction.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Poster: Enhancing Network Traffic Analysis with Pre-trained Side-channel Feature Imputation.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Modified 2D-Ghost-Free Stereoscopic Display with Depth-of-Field Effects.
ACM Trans. Multim. Comput. Commun. Appl., February, 2023

AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

Keeping Your Enemies Closer: Shedding Light on the Attacker's Optimal Strategy.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

Payload Level Graph Attention Network for Web Attack Traffic Detection.
Proceedings of the Computational Science - ICCS 2023, 2023

Towards Open-Set APT Malware Classification under Few-Shot Setting.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Optimal Strategy Selection for Cyber Deception via Deep Reinforcement Learning.
Proceedings of the IEEE Smartworld, 2022

Hybrid Routing for Efficient Fine-Grained Management of Specific Services in SDN.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

High-Efficient and Few-shot Adaptive Encrypted Traffic Classification with Deep Tree.
Proceedings of the IEEE Military Communications Conference, 2022

Robust Stereo Matching with an Unfixed and Adaptive Disparity Search Range.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

A Novel Stereo Matching Pipeline with Robustness and Unfixed Disparity Search Range.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Optimal strategy selection for attack graph games using deep reinforcement learning.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
Mining Trojan Detection Based on Multi-dimensional Static Features.
Proceedings of the Science of Cyber Security - Third International Conference, 2021

HSLF: HTTP Header Sequence Based LSH Fingerprints for Application Traffic Classification.
Proceedings of the Computational Science - ICCS 2021, 2021

2020
A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources.
Int. J. Digit. Crime Forensics, 2020

What You See Is Not What You Get: Towards Deception-Based Data Moving Target Defense.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020

WGT: Thwarting Web Attacks Through Web Gene Tree-based Moving Target Defense.
Proceedings of the 2020 IEEE International Conference on Web Services, 2020

2019
A new visual evaluation criterion of visual cryptography scheme for character secret image.
Multim. Tools Appl., 2019

Dynamical model for individual defence against cyber epidemic attacks.
IET Inf. Secur., 2019

A Heuristic Method for Network Modification Against Cyber Epidemic Attacks.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Modeling an Information-Based Advanced Persistent Threat Attack on the Internal Network.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
A white-box AES-like implementation based on key-dependent substitution-linear transformations.
Multim. Tools Appl., 2018

Visual cryptograms of random grids via linear algebra.
Multim. Tools Appl., 2018

Progressive Scrambling for Social Media.
Int. J. Digit. Crime Forensics, 2018

A Privacy Protection Approach Based on Android Application's Runtime Behavior Monitor and Control.
Int. J. Digit. Crime Forensics, 2018

Visual Gambling.
Int. J. Digit. Crime Forensics, 2018

Protecting white-box cryptographic implementations with obfuscated round boundaries.
Sci. China Inf. Sci., 2018

Characterizing the Optimal Attack Strategy Decision in Cyber Epidemic Attacks with Limited Resources.
Proceedings of the Science of Cyber Security - First International Conference, 2018

2017
New insight into linear algebraic technique to construct visual cryptography scheme for general access structure.
Multim. Tools Appl., 2017

On the Pixel Expansion of Visual Cryptography Scheme.
Int. J. Digit. Crime Forensics, 2017

Cheating prevention visual cryptography scheme using Latin square.
IET Inf. Secur., 2017

On the construction of differentially 4-uniform involutions.
Finite Fields Their Appl., 2017

Perfect contrast XOR-based visual cryptography schemes via linear algebra.
Des. Codes Cryptogr., 2017

Temporal Integration Based Visual Cryptography Scheme and Its Application.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

2016
2D Barcodes for visual cryptography.
Multim. Tools Appl., 2016

Basic Visual Cryptography Using Braille.
Int. J. Digit. Crime Forensics, 2016

An Algorithm for Counting the Number of 2<sup>n</sup>-Periodic Binary Sequences with Fixed k-Error Linear Complexity.
IACR Cryptol. ePrint Arch., 2016

An Adaptive Reversible Data Hiding Scheme for JPEG Images.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Information Security Display Technology with Multi-view Effect.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Halftone Visual Cryptography with Complementary Cover Images.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Collusive Attacks to Partition Authentication Visual Cryptography Scheme.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Privacy Monitor.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

The Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity.
Proceedings of the Information Security Practice and Experience, 2016

The Linear Complexity and 2-Error Linear Complexity Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed Hamming Weight.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2015
Event Analogy Based Privacy Preservation in Visual Surveillance.
Proceedings of the Image and Video Technology - PSIVT 2015 Workshops, 2015

An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

A New Construction of Tagged Visual Cryptography Scheme.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications, Second Edition
Springer, ISBN: 978-3-319-23473-1, 2015

2014
ESSVCS: An Enriched Secret Sharing Visual Cryptography.
Trans. Data Hiding Multim. Secur., 2014

Flexible Visual Cryptography Scheme and Its Application.
Trans. Data Hiding Multim. Secur., 2014

k out of k extended visual cryptography scheme by random grids.
Signal Process., 2014

Braille for Visual Cryptography.
Proceedings of the 2014 IEEE International Symposium on Multimedia, 2014

Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications
Springer, ISBN: 978-3-319-09644-5, 2014

2013
Threshold visual secret sharing by random grids with improved contrast.
J. Syst. Softw., 2013

Threshold Secret Image Sharing.
IACR Cryptol. ePrint Arch., 2013

The Security Defect of a Multi-pixel Encoding Method.
Proceedings of the Information Security, 16th International Conference, 2013

On the Randomness of Visual Cryptography Scheme.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

On (k, n) Visual Cryptography Scheme with t Essential Parties.
Proceedings of the Information Theoretic Security - 7th International Conference, 2013

2012
Improving the visual quality of size invariant visual cryptography scheme.
J. Vis. Commun. Image Represent., 2012

Using Variance to Analyze Visual Cryptography Schemes.
IACR Cryptol. ePrint Arch., 2012

A Secret Enriched Visual Cryptography.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

On the Equivalence of Two Definitions of Visual Cryptography Scheme.
Proceedings of the Information Security Practice and Experience, 2012

Visual Cryptography for Natural Images and Visual Voting.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

2011
Embedded Extended Visual Cryptography Schemes.
IEEE Trans. Inf. Forensics Secur., 2011

Cheating immune visual cryptography scheme.
IET Inf. Secur., 2011

Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners.
IET Inf. Secur., 2011

Encrypting More Information in Visual Cryptography Scheme.
IACR Cryptol. ePrint Arch., 2011

Flexible Visual Cryptography Scheme without Distortion.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attacks.
Proceedings of the Trusted Systems - Third International Conference, 2011

Multi-pixel Encryption Visual Cryptography.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

2010
Step construction of visual cryptography schemes.
IEEE Trans. Inf. Forensics Secur., 2010

A new definition of the contrast of visual cryptography scheme.
Inf. Process. Lett., 2010

Optimal XOR based (2, n)-Visual Cryptography Schemes.
IACR Cryptol. ePrint Arch., 2010

Some Extensions on Threshold Visual Cryptography Schemes.
Comput. J., 2010

2009
The alignment problem of visual cryptography schemes.
Des. Codes Cryptogr., 2009

2008
Many-to-one encryption and authentication scheme and its application.
J. Commun. Networks, 2008

Colour visual cryptography schemes.
IET Inf. Secur., 2008

Analysis of an authenticated identity-based multicast scheme.
IET Commun., 2008


  Loading...