Feng Liu
 
   
 

Feng Liu 

[fə:n lijuː]

Education & Work experiences
 
2014.10~Present Institute of Information Engineering(IIE), Chinese Academy of Sciences(CAS) & School of Cybersecurity, UCAS Beijing
  Professor, Ph.D Supervisor  
2014.10~2017.06 IIE, CAS Beijing
 

Professor, Ph.D Supervisor

Director of the Executive Office of SKLOIS

 
2012.01~2014.09 IIE, CAS Beijing
 

Associate Professor, Ph.D Supervisor

Director of the Executive Office of SKLOIS

 
2011.01~2012.01 Institute of Software, CAS(ISCAS) Beijing
  Associate Professor  
2009.04~2010.12 ISCAS Beijing
  Assistant Professor  
2003.09~2008.12 SKLOIS, ISCAS Beijing
  Ph.D of Information security  
1999.09~2003.06 School of Computer Science, Shandong University Jinan, SD
  B.Eng. of Computer Science  
 
 
My Team
  1. Lidong Zhai (Cybersecurity Strategy), Associate professor.
  2. Xiaoyu Zhang (AI), Associate professor.
  3. Wen Wang (Visual Security), Associate professor.
  4. Peng Wang (Cybersecurity), Research assistant.
  5. Jun Li (Cybersecurity Strategy), Research assistant.
  6. Miao Liu (Cybersecurity Strategy), Research assistant.
 

 

 
Students
  1. [2020.09-Present] Qiang Wang (Cybersecurity), SKLOIS, IIE, CAS. Ph.D student.
  2. [2020.09-Present] Han Miao (Cybersecurity), SKLOIS, IIE, CAS. Ph.D student.
  3. [2019.09-Present] Lin Li (Network Security), SKLOIS, IIE, CAS. Master student.
  4. [2019.09-Present] Huaifeng Bao (Network Security), SKLOIS, IIE, CAS. Ph.D student.
  5. [2019.09-Present] Wenhao Li (Network Security), SKLOIS, IIE, CAS. Master student.
  6. [2018.09-Present] Weixia Cai (Science of Cybersecurity), SKLOIS, IIE, CAS. Ph.D student.
  7. [2018.09-Present] Zixian Tang (Cybersecurity), SKLOIS, IIE, CAS. Ph.D student.
  8. [2017.09-Present] Yuantian Zhang (System Security), SKLOIS, IIE, CAS. Ph.D student.
  9. [2017.09-Present] Zheng Tian (System Security), SKLOIS, IIE, CAS. Master student.
  10. [2017.09-2020.06] Liyan Liu (System Security), SKLOIS, IIE, CAS. Master.
                                 Now with MeituanInc..
  11. [2016.09-Present] Qian Zhao (Cybersecurity Strategy), SKLOIS, IIE, CAS. Ph.D student.
  12. [2016.09-Present] Lan Pi (Cybersecurity Strategy), SKLOIS, IIE, CAS. Ph.D student.
  13. [2016.09-Present] Kun Jia (Network Security), SKLOIS, IIE, CAS. Ph.D student.
  14. [2016.09-Present] Jiazhi Liu (Visual Security), SKLOIS, IIE, CAS. Master student.
  15. [2015.03-Present] Yaqin Zhang (Science of Cybersecurity), SKLOIS, IIE, CAS. Master student.
  16. [2015.09-2019.12] Dingyu Yan (Network Security), SKLOIS, IIE, CAS. Ph.D.
                                 Now with CNCERT.
  17. [2015.03-2018.07] Yi Zhang (System Security), SKLOIS, IIE, CAS. Master.
                                 Now with Baidu Inc..
  18. [2015.03-2018.01] Tao Xu (Co-supervised with Prof. C Wu. Cryptography), SKLOIS, IIE, CAS. Ph.D.
  19. [2014.07-2017.07] Jiaxin Yin (Cryptography), SKLOIS, IIE, CAS. Master.
                                 Graduated and worked at SinoRail Information Engineering Group.
  20. [2013.07-2016.07] Huashan Chen (Security System), SKLOIS, IIE, CAS. Master.
                                 Studying for his doctorate at Texas University at San Antonio.
  21. [2012.09-2018.01] Wen Wang, (Cryptography), SKLOIS, IIE, CAS. Ph.D.
                                 Now with IIE.
  22. [2012.09-2017.07] Yawei Ren, (Co-supervised with Prof. D Lin. Visual Cryptography), SKLOIS, IIE, CAS. Ph.D.
                                 Now with Beijing Information Science Technology University.
  23. [2010.09-2015.01] Wenhao Wang (Co-supervised with Prof. D Lin. Security System), SKLOIS, IIE, CAS. Ph.D.
                                 Now with IIE.
  24. [2010.09-2015.01] Teng Guo (Co-supervised with Prof. C Wu. Visual cryptography), SKLOIS, IIE, CAS. Ph.D.
                                 Now with University of International Relations.
  25. [2009.09-2012.09] Qinggang Yue (Co-supervised with Prof. R Xue. Security Protocol), SKLOIS, IOS, CAS. Master.
                                 Now with University of Massachusetts.
  26. [2008.09-2011.09] Jianhua Peng (Co-supervised with Prof. R Xue. Security Protocol), SKLOIS, IOS, CAS. Master.
                                 Now with East China University of Science and Technology.
  27. [2008.09-2011.09] Zhenju Zhao (Co-supervised with Prof. Z Zhang. Security Protocol), SKLOIS, IOS, CAS. Master.
                                 Now with Baidu Inc..
  28. [2008.09-2011.09] Danqing Huang (Co-supervised with Prof. D Ji. Security Protocol), SKLOIS, IOS, CAS. Master.
                                 Now with Microsoft Research(MSRA).
 
  Visiting Students
  1. [2019.07-2022.08] Yuwen Zhu (Cyber A&D), Zhengzhou Information Engineering University. Ph.D student.
  2. [2019.07-2020.08] Qiang Wang (Infomation Security), Xidian University. B.S. student.
  3. [2019.12-2020.08] Han Miao (Comuputer Science), Xidian University. B.S. student.
  4. [2018.12-2019.08] Lin Li (Comuputer Science), Hebei University. B.S. student.
  5. [2018.12-2019.08] Huaifeng Bao (Mathematics), Peking University. B.S. student.
  6. [2015.04-2016.04] Gang Shen (Cryptography), Zhengzhou Information Engineering University. Ph.D student.
  7. [2014.11-2014.12] Guangyu Wang (Cryptography), Auckland University of Technology. Master student.
 
  Academic Activities
  1. General Co-Chair of the 3rd International Conference of Science of Cybersecurity, SciSec2020, Shanghai China, 2020.
  2. PC Chair of the 2st International Conference of Science of Cybersecurity, SciSec2019, Nanjing China, 2019.
  3. Program committee member of the 2nd International Conference on Security with Intelligent Computing and Big-data Services, SICBS 2018, Guilin China, 2018.
  4. Co-editor in Chief of the International Journal of Digital Crime and Forensics, IJDCF, 2018-2023.
  5. Sponsor and PC Chair of the 1st International Conference of Science of Cybersecurity, SciSec2018, Beijing China, 2018.
  6. Program committee member of 17th IEEE International Conference on Computer and Information Technology, IEEE CIT 2017.
  7. Program committee member of The 3rd International Workshop on Digital Crime and Forensics, IWDCF 2017.
  8. Program committee member of 11th International Conference on Provable Security, ProvSec 2017.
  9. Committee member of the Competition Practice Working Committee of CyberSecurity Association of China (CSAC).
  10. Program committee member of 5th International Workshop on Biometrics and Forensics, IWBF2017.
  11. TPC co-chair of 2017 WASE International Conference on Information Engineering, ICIE2017.
  12. PC Chair of The 2nd International Workshop on Digital Crime and Forensics, Beijing China, November 2016.
  13. Program committee member of 16th IEEE International Conference on Computer and Information Technology, IEEE CIT 2016.
  14. Organizing chair of IWDW2016, Beijing China, 17-19 2016.
  15. PC Chair of The First International Workshop on Digital Crime and Forensics,  Xi’an China, November 15 2015.
  16. General Chair of Workshop for Visual Cryptography, Beijing, China, Octomber 17 2013.
  17. Program Chair of 2nd SKLOIS Workshop for Young researchers, Beijing China, June 1 2013.
  18. Program committee member of IWDW2013, CBD Auckland, New Zealand, 1-4 October 2013.
  19. Session organizing chair of IIH-MSP2013 for special session on visual cryptography and secret image sharing, 2013.
  20. Guest editor of Special Issue on Visual Cryptography for Springer Transactions on Data Hiding and Multimedia Security, 2013.
  21. Guest editor of Special Issue for Visual Cryptography and Secret Image Sharing Journal of Electrical and Computer Engineering, 2012.
  22. Publicity co-chair of WPS-12, 2012.
  23. Session chair of 7th China International Conference on Information Security and Cryptology (Inscrypt2011) 2011.
  24. Program Chair of 1st SKLOIS Workshop for Young researchers, Beijing China, 18-19 December 2010.
  25. Organizing committee member of Inscrypt 2010, 6th SKLOIS Conference on Information Security and Cryptology, Beijing China, October 20-24, 2010.
  26. Organizing committee member of SETA`06, Sequences and Their Applications, Beijing China, September, 24-28, 2006.
  27. Organizing committee member of Inscrypt 2006, Information Security and Cryptology, Second SKLOIS Conference, Beijing China, November, 29-December 1, 2006.
  28. Organizing committee member of CISC 2005, SKLOIS Conference on Information Security and Cryptology, Beijing China, December, 15-17, 2005.
 
  Awards
  1. IIE Outstanding strategic research  report 2017.
  2. IIE Outstanding strategic research  report 2015.
  3. SKLOIS best paper award 2013.
  4. JVCIR (Elsevier) top 25 viewed paper award 2012.
  5. IIE & SKLOIS best paper award 2012.
  6. IIE faculty award 2012.
  7. SKLOIS faculty award 2012.
 
 
Hobbies
  1. Bike riding: Road cycling to Changping at weekend many times.
  2. Reading: Science fiction and history fiction are my favorites. (THREE BODY)
  3. Mountaineering: Left footprints on many mountains around Beijing and Jinan.
  4. Driving: Many places around Beijing, Jinan and Changzhou.
  5. Table tennis: The most popular game among my friends.
  6. Traveling: most cities in Shandong, 5 cities in Jiangsu, 3 cities in Zhejiang, Beijing ,Tianjin, Beidaihe, Qinhuangdao, Bashang grassland, Guangzhou, Shenzhen, Changsha, York UK, London UK, Atlantic City USA, Singapore, Auckland New Zealand, Magdeburg Germany, Dubai The United Arab Emirates ...
     
 

 

  Team Honors
  1. Qiang Wang, Han Miao, & Lin Li have won 2020 Datacon "Encrypt Malicious Traffic" Match 3th award.
  2. Zixian Tang, Huaifeng Bao have won 2020 Datacon "Malware Detection" Match 3th award.
  3. Teng Guo has won 2014 Three Good Student Model of CAS.
  4. Teng Guo has won the 2014 President's Award of CAS.
  5. Feng Liu was selected to be funded by "Youth Innovation Promotion Association" of CAS.
  6. Feng Liu has won 2008 Three Good Student Model of CAS.