Qixu Liu
Orcid: 0000-0003-0895-9585
According to our database1,
Qixu Liu
authored at least 67 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Cybersecur., December, 2024
Comput. Secur., January, 2024
TaDFusion: Infrared and Visible Image Fusion Network Based on The Target Detection Task-driven Method.
Proceedings of the International Joint Conference on Neural Networks, 2024
MalPolymer: A Threat Identification System Utilizing Cognate Malicious Login Behavior Detection.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
MemAPIDet: A Novel Memory-resident Malware Detection Framework Combining API Sequence and Memory Features.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
Cybersecur., December, 2023
MRm-DLDet: a memory-resident malware detection framework based on memory forensics and deep neural network.
Cybersecur., December, 2023
Inf. Softw. Technol., 2023
TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification.
Proceedings of the ACM Web Conference 2023, 2023
BehavSniffer: Sniff User Behaviors from the Encrypted Traffic by Traffic Burst Graphs.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023
Phish2vec: A Temporal and Heterogeneous Network Embedding Approach for Detecting Phishing Scams on Ethereum.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023
IMaler: An Adversarial Attack Framework to Obfuscate Malware Structure Against DGCNN-Based Classifier via Reinforcement Learning.
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
DeepCall: A Fast and Robust Malware Classification System with DGCNN and Function Call Graph.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023
ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications.
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
CPGBERT: An Effective Model for Defect Detection by Learning Program Semantics via Code Property Graph.
Proceedings of the IEEE International Conference on Trust, 2022
DroidFP: A Zero-Permission Detection Framework for Android Devices Based on Gated Recurrent Unit.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
Proceedings of the Information and Communications Security - 24th International Conference, 2022
P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
Proceedings of the 14th IEEE International Conference on Big Data Science and Engineering, 2020
2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019
Proceedings of the Communications and Networking, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Sci. China Inf. Sci., 2018
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Proceedings of the Science of Cyber Security - First International Conference, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
2017
Driving Android apps to trigger target API invocations based on activity and GUI filtering.
Sci. China Inf. Sci., 2017
Sci. China Inf. Sci., 2017
2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
2015
Comput. Networks, 2015
IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component Communication.
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
Secur. Commun. Networks, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
POSTER: Recommendation-based Third-Party Tracking Monitor to Balance Privacy with Personalization.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
RPFuzzer: A Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing.
KSII Trans. Internet Inf. Syst., 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
J. Syst. Softw., 2012
Ad Hoc Networks, 2012
BlendFuzz: A Model-Based Framework for Fuzz Testing Programs with Grammatical Inputs.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 7th International Conference on Communications and Networking in China, 2012
2011
Proceedings of the Sixth International Conference on Image and Graphics, 2011
Proceedings of the First Asian Conference on Pattern Recognition, 2011
2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
2008