Qingyun Liu
Orcid: 0000-0003-4815-3463Affiliations:
- Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
- University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China
According to our database1,
Qingyun Liu
authored at least 90 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2012
2014
2016
2018
2020
2022
2024
0
5
10
15
20
15
19
11
5
8
8
9
3
1
3
5
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
HSDirSniper: A New Attack Exploiting Vulnerabilities in Tor's Hidden Service Directories.
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the ACM on Web Conference 2024, 2024
Knock-Knock: De-Anonymise Hidden Services by Exploiting Service Answer Vulnerability.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the 32nd IEEE/ACM International Conference on Program Comprehension, 2024
Proceedings of the IEEE Symposium on Computers and Communications, 2024
P4-FILB: Stateless Load Balancing Mechanism in Firewall and IPv6 Environment with P4.
Proceedings of the IEEE International Performance, 2024
Proceedings of the IEEE International Performance, 2024
Beneath the Facade of IP Leasing: Graph-Based Approach for Identifying Malicious IP Blocks.
Proceedings of the Computational Science - ICCS 2024, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
A Targeted Adversarial Attack Method for Multi-Classification Malicious Traffic Detection.
Proceedings of the IEEE International Conference on Acoustics, 2024
ProxyKiller: An Anonymous Proxy Traffic Attack Model Based on Traffic Behavior Graphs.
Proceedings of the Computer Security - ESORICS 2024, 2024
From Fingerprint to Footprint: Characterizing the Dependencies in Encrypted DNS Infrastructures.
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
6GAI: Active IPv6 Address Generation via Adversarial Training with Leaked Information.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the Science of Cyber Security - 5th International Conference, 2023
Wrapping DNS into HTTP(S): An Empirical Study on Name Resolution in Mobile Applications.
Proceedings of the IFIP Networking Conference, 2023
Proceedings of the Information Security - 26th International Conference, 2023
A Comprehensive Evaluation of the Impact on Tor Network Anonymity Caused by ShadowRelay.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Hunting for Hidden RDP-MITM: Analyzing and Detecting RDP MITM Tools Based on Network Features.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
CCSv6: A Detection Model for DNS-over-HTTPS Tunnel Using Attention Mechanism over IPv6.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the IEEE International Performance, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
AHIP: An Adaptive IP Hopping Method for Moving Target Defense to Thwart Network Attacks.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Detecting Fake-Normal Pornographic and Gambling Websites through one Multi-Attention HGNN.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
SpoofingGuard: A Content-agnostic Framework for Email Spoofing Detection via Delivery Graph.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
A Robust and Accurate Encrypted Video Traffic Identification Method via Graph Neural Network.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023
2022
A Lightweight Graph-based Method to Detect Pornographic and Gambling Websites with Imperfect Datasets.
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022
Fighting Against Piracy: An Approach to Detect Pirated Video Websites Enhanced by Third-party Services.
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Proceedings of the Computational Science - ICCS 2022, 2022
Proceedings of the IEEE International Conference on Communications, 2022
GDMD: A Transmission Control Scheme with Block Information-aware for Delay Sensitive Multimedia.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
RTD: The Road to Encrypted Video Traffic Identification in the Heterogeneous Network Environments.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
SequenceShield: A Robust and Accurate DDoS Detection Method via Serializing the Traffic with Direction Information.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022
2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
A P4-Based Packet Scheduling Approach for Clustered Deep Packet Inspection Appliances.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
2020
You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi.
Proceedings of the 29th USENIX Security Symposium, 2020
MAAN: A Multiple Attribute Association Network for Mobile Encrypted Traffic Classification.
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the Knowledge Science, Engineering and Management, 2020
Traceback: Learning to Identify Website's Landing URLs via Noisy Web Traces Passively.
Proceedings of the 27th International Conference on Telecommunications, 2020
DOOM: a Training-Free, Real-Time Video Flow Identification Method for Encrypted Traffic.
Proceedings of the 27th International Conference on Telecommunications, 2020
ITP-KNN: Encrypted Video Flow Identification Based on the Intermittent Traffic Pattern of Video and K-Nearest Neighbors Classification.
Proceedings of the Computational Science - ICCS 2020, 2020
How Many Users Behind A Local Recursive DNS Server? Estimated by Delta-Time Cluster Model.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020
2019
Learning from Time Series with Outlier Correction for Malicious Domain Identification.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019
IDNS: A High-Performance Model for Identification of DNS Infrastructures on Large-scale Traffic.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities.
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the Computational Science - ICCS 2019, 2019
Hunting for Invisible SmartCam: Characterizing and Detecting Smart Camera Based on Netflow Analysis.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Tensor: A Transaction-Oriented Low-Latency and Reliable Data Distribution Scheme for Multi-IDCs Based on Redis.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
NTS: A Scalable Virtual Testbed Architecture with Dynamic Scheduling and Backpressure.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019
2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
WDMTI: Wireless Device Manufacturer and Type Identification Using Hierarchical Dirichlet Process.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018
Redis++: A High Performance In-Memory Database Based on Segmented Memory Management and Two-Level Hash Index.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
MalFilter: A Lightweight Real-Time Malicious URL Filtering System in Large-Scale Networks.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Proceedings of the Advances in Digital Forensics XIV, 2018
DomainObserver: A Lightweight Solution for Detecting Malicious Domains Based on Dynamic Time Warping.
Proceedings of the Computational Science - ICCS 2018, 2018
Proceedings of the IEEE Global Communications Conference, 2018
2017
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Proceedings of the Applications and Techniques in Information Security, 2017
2016
CookieMiner: Towards real-time reconstruction of web-downloading chains from network traces.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2015
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015
Proceedings of the IEEE 35th International Conference on Distributed Computing Systems Workshops, 2015
Limited Dictionary Builder: An approach to select representative tokens for malicious URLs detection.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
2014
Proceedings of the Trustworthy Computing and Services - International Conference, 2014
Proceedings of the Trustworthy Computing and Services - International Conference, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014
2013
EPLogCleaner: Improving Data Quality of Enterprise Proxy Logs for Efficient Web Usage Mining.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
A New Approach to Decrease Invalidate Rate of Weak Consistency Methods in Web Proxy Caching.
Proceedings of the Trustworthy Computing and Services, 2013
2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012