Feng Liu
 
   
 

Books & Chapters

Monographs

  1. Feng Liu and Weiqi Yan. Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications . Springer-Verlag London, 2014. (e-version, and 2nd Edition 2015)
  2. Feng Liu etc. Overview of the Cybersecurity System in USA. Science Press, 2015. 刘峰等著,《美国网络空间安全体系》,科学出版社,2015。

Books Edited

  1. Chunhua Su, Kouichi Sakurai, Feng Liu. Proceedings of 4th International Workshop on Science of Cybersecurity, SciSec2022, Matsue, Japan, August 10–12, 2022.Lecture Notes in Computer Science (LNCS, volume 13580) (e-version)
  2. Wenlian Lu, Kun Sun, Moti Yung, Feng Liu. Proceedings of 3rd International Workshop on Science of Cybersecurity, SciSec2021, Shanghai, China, August 13-15, 2021.Lecture Notes in Computer Science (LNCS, volume 13005) (e-version)
  3. Feng Liu, Jia Xu, Shouhuai Xu, Moti Yung. Proceedings of 2st International Workshop on Science of Cybersecurity, SciSec2019, Nanjing, China, August 9-11, 2019. Lecture Notes in Computer Science (LNCS, volume 11933)(e-version)
  4. Feng Liu, Shouhuai Xu, Moti Yung. Proceedings of 1st International Workshop on Science of Cybersecurity, SciSec2018, Beijing, China, August 12-14, 2018. Lecture Notes in Computer Science (LNCS, volume 11287)(e-version)
  5. Shi, Y.Q., Kim, H.J., Perez-Gonzalez, F., Liu, F. Proceedings of 15th International Workshop on Digital Forensics and Watermarking, IWDW2016, Beijing, China, September 17-19, 2016. (e-version)
  6. Feng Liu and Weiqi Yan. Special Issue on Visual Cryptography of Springer Transactions on Data Hiding and Multimedia Security. Contains 7 papers selected from 21 submissions, Springer LNCS 8363 , 2014. (e-version)
  7. Dongdai Lin, Feng Liu. Special Issue on cryptography of Communications of the CCISA. Contains 4 review and progress articles. To appear in 2015.

Chapters

  1. Feng Liu. Chapter 3: Cryptology and security protocol", in book "Security Fundamentals of Internet of Things, pages 30-75. Science Press, 2013.刘峰,密码学与安全协议基础,《物联网安全基础》,页30-75,科学出版社,2013。
  2. Feng Liu. The optimization problem of visual cryptography scheme. In book "10000 Selected Problems in Sciences Information Sciences", Science Press, 2011.刘峰,视觉密码方案的最优化问题,《10000个科学难题?#20449;息科学卷》,科学出版社,2011。
  3. Feng Liu. Resolving the Alignment Problem in Visual Cryptography. In book "Visual Cryptography and Secret Image Sharing", pages 297-328, CRC press Taylor & Francis LLC, ISBN: 9781439837214 , 2011.
  4. Feng Liu. On the progress of Visual Cryptography. In book "Progress of Cryptography in China", pages 32-67, Publishing House of Electronics Industry, 2010. 刘峰,视觉密码学研究进展,《中国密码学发展报告2010 》,页32-67,电子工业出版社,2010.
  5. Feng Liu. Visual Cryptography. To appear in Dictionary of Mathematics, 2013. 刘峰,视觉密码学,《数学大词典》,2013.

Journal Papers
  1. Jiazhi Liu and Feng Liu "Modified 2D-Ghost-Free Stereoscopic Display with Depth-of-Field Effects". Accepted by ACM Transactions on Multimedia Computing Communications and Applications, 2022.
  2. Yaqin Zhang, Duohe Ma, Xiaoyan Sun, Chuan Zhou, Feng Liu "A Study on Deception-based Moving Target Defense", accepted by Journal of Cybersecurity(in Chinese), 2021. 张雅勤,马多贺,Xiaoyan Sun, 周川,刘峰,基于网络空间欺骗的移动目标防御技术研究,《信息安全学报》2021。
  3. Jia Kun, Wang Junnan, Liu Feng "DDoS detection and mitigation Framework in SDN", accepted by Journal of Cybersecurity(in Chinese), 2020. 贾锟、 王君楠、刘峰, SDN环境下的DDoS检测与缓解机制,《信息安全学报》2020。
  4. Liyan Liu, Feng Liu, Yanyan Zou, Jianhua Zhou, Aihua Piao, Feng Liu, Wei Huo "SiCsFuzzer: A Sparse-instrumentation-based Fuzzing Platform for Closed Source Software", accepted by Journal of Cybersecurity(in Chinese), 2020. 刘丽艳、李丰、邹燕燕、周建华、朴爱华、刘峰、霍玮,SiCsFuzzer:基于稀疏插桩的闭源软件模糊测试方法,《信息安全学报》2020。
  5. Dingyu Yan, Feng Liu, Yaqin Zhang, Kun Jia "Dynamical model for individual defence against cyber epidemic attacks ", accepted by IET Information Security, 2019.
  6. Yawei Ren, Feng Liu, Weiqi Yan and Wen Wang. A New Visual Evaluation Criterion of Visual Cryptography Scheme for Character Secret Image. Multimedia Tools and Applications, volume 78 (18), pages 25299–25319,2019.
  7. Tao Xu, Chuankun Wu, Feng Liu, Ruoxin Zhao "Protecting White-Box Cryptographic Implementations with Obfuscated Round Boundaries", SCIENCE CHINA Information Sciences, volume 61, issue 3, pages 237-239, 2018.
  8. Gang Shen, Feng Liu, Zhengxin Fu and Bin Yu "Visual Cryptograms of Random Grids via Linear Algebra", Multimedia Tools and Applications, volume 77,  issue 10, pages 12871-12899, 2018.
  9. Tao Xu, Feng Liu and Chuankun Wu "A White-Box AES-Like Implementation Based on Key-Dependent Substitution-Linear Transformations", Multimedia Tools and Applications, volume 77, pages 18117–18137, 2018.
  10. Xiaotian Wu, Weiqi Yan and Feng Liu, "Progressive Scrambling for Social Media", International Journal of Digital Crime and Forensics, volume 10, issue 2, pages 56–73,2018.
  11. Huashan Chen, Xiuyan Zhao, Feng Liu, Shouhuai Xu and Wenlian Lu "Optimizing interconnections to maximize the spectral radius of interdependent networks", Physical Review E, volume 95, 032308 , 2017.
  12. Teng Guo, Jian Jiao, Feng Liu and Wen Wang "On the Pixel Expansion of Visual Cryptography Scheme" International Journal of Digital Crime and Forensics, volume 9 issue 2, pages 38-44, , 2017.
  13. Gang Shen, Feng Liu, Zhengxin Fu and Bi-n Yu "Perfect Contrast XOR-based Visual Cryptography Schemes via Linear Algebra", Designs, Codes and Cryptography, volume 85, issue 1, pages 15-37, 2017. 
  14. Gang Shen, Feng Liu, Zhengxin Fu and Bin Yu "New insight into linear algebraic technique to construct visual cryptography scheme for general access structure", Multimedia Tools and Applications , volume 54, pages 140-151, 2017. 
  15. Yawei Ren, Feng Liu etc. "Cheating prevention visual cryptography scheme using Latin square" IET Information Security, volume 11 issue 4, page 211-219, 2017.
  16. Guangyu Wang, Feng Liu, Weiqi Yan "Basic Visual Cryptography Using Braille" International Journal of Digital Crime and Forensics, volume 8 issue 3, pages 85-93, , 2016.
  17. Guangyu Wang, Feng Liu, Weiqi Yan "2D Barcodes for Visual Cryptography" Multimedia Tools and Applications, volume 75, issue 2, pages 1223-1241, November, 2014. (DOI)
  18. Teng Guo, Feng Liu and Chuankun Wu. k out of k extended visual cryptography scheme by random grids. Signal Processing (Elsevier), volume 94, pages 90–101, January 2014.
  19. Feng Liu, Weiqi Yan, Peng Li and Chuankun Wu. ESSVCS: An Enriched Secret Sharing Visual Cryptography. Springer Transactions on Data Hiding and Multimedia Security, LNCS 8363, pages 1-24, 2014.
  20. Feng Liu, Teng Guo, Chuankun Wu and Ching-Nung Yang. Flexible Visual Cryptography Scheme Without Distortion and Its Application. Springer Transactions on Data Hiding and Multimedia Security, LNCS 8363, pages 110-130, 2014.
  21. Teng Guo, Feng Liu and Chuankun Wu. Threshold visual secret sharing by random grids with improved contrast. Journal of Systems and Software, volume 86, issue 8, pages 2094–2109, 2013.
  22. Feng Liu, Teng Guo and Chuankun Wu and Lina Qian. Improving the Visual Quality of Size Invariant Visual Cryptography Scheme. Journal of Visual Communication and Image Representation, volume 23, pages 331-342, 2012.
  23. Feng Liu and Chuankun Wu. Embedded Extended Visual Cryptography Schemes. IEEE Transactions on Information Forensics & Security, volume 6, No. 2, pages 307-322, 2011, also available at ePrint Archive 2010/439.
  24. Feng Liu, Chuankun Wu and Xijun Lin. Cheating Immune Visual Cryptography Scheme. IET Information Security, volume 5, issue 1, pages 51-59, 2011.
  25. Ching-Nung Yang, Chih-Cheng Wu and Feng Liu. Construction of General (k, n) Probabilistic Visual Cryptography Schemes. Journal of Electronic Science and Technology, volume 9, No. 4, pages 317-324, 2011.
  26. Peng Li, Peijun Ma and Feng Liu. Multi-Threshold Image Secret Sharing Scheme. Journal of Electronics, volume 40, issue 3, pages 518-524, 2012. 李鹏、马培军、刘峰,多重门限的图像秘密共享方案,《电子学报》,卷40,期3,页518-524,2012。
  27. Junqing Liang, XiJun Lin and Feng Liu. CLPKE: Against A Variation of Key Replacement Attack without Bilinear Pairing. JCIT: Journal of Convergence Information Technology, volume 7, No. 3, pages 137-145, 2012.
  28. Feng Liu, Chuankun Wu and Xijun Lin. Step Construction of Visual Cryptography Schemes. IEEE Transactions on Information Forensics & Security, volume 5, No. 1, pages 27-38, 2010.
  29. Feng Liu, Chuankun Wu and Xijun Lin. A New Definition of the Contrast of Visual Cryptography Scheme. Information Processing Letters, volume 110, pages 241-246, 2010.
  30. Feng Liu, Chuankun Wu and Xijun Lin. Some Extensions on Threshold Visual Cryptography Schemes. The Computer Journal, volume 53, issue 1, pages 107-119, 2010.
  31. Feng Liu and Chuankun Wu. A Robust Visual Cryptography Based Watermarking Scheme for Multiple Cover Images and Multiple Owners. IET Information Security, volume 5, issue 2, pages 121–128, 2010.
  32. Feng Liu, Chuankun Wu and Xijun Lin. The Alignment Problem of the Visual Cryptography Scheme. Designs, codes and cryptography, volume 50, issue 2, pages 215-227, 2009.
  33. Xijun Lin, Chuankun Wu and Feng Liu. Many-to-one Encryption and Authentication Scheme and Its Application" Journal of Communications and Networks Volume 10, No. 1, pages 18-27, 2008.
  34. Xijun Lin, Chuankun Wu and Feng Liu. Analysis of An Authenticated Identity-based Multicast Scheme. IET Proceedings-Communications Volume 2, issue 7, pages 935-937, 2008.
  35. Feng Liu, Chuankun Wu and Xijun Lin. Colour Visual Cryptography Schemes. IET Information Security Volume 2, issue 4, pages 151-165, 2008.
  36. Feng Liu, Peng Li and Chuankun Wu. Encrypting More Information in Visual Cryptography Scheme. available at ePrint Archive 2011/340, 2011. An updated version of the paper has been accepted to be published in IWDW2012.
Conference Papers
  1. Huaifeng Bao, Li Wenhao, Xingyu Wang, Zixian Tang, Qiang Wang, Wen Wang and Feng Liu " Payload Level Graph Attention Network for Web Attack Traffic Detection". Accepted by ICCS 2023.
  2. Yuantian Zhang, Feng Liu and Huashan Chen "Optimal Strategy Selection for Cyber Deception via Deep Reinforcement Learning" Accepted by IEEE UIC 2022 (The 2022 IEEE International Conference on Ubiquitous Intelligence and Computing, 15-18 December, Haikou China), 2022.
  3. Qiang Wang, Wenhao Li, Huaifeng Bao, Zixian Tang, Wen Wang, Feng Liu and Lingyun Ying "High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree" Accepted by MILCOM 2022.
  4. Kun Jia, Jiazhi Liu, Wen Wang and Feng Liu. “Hybrid Routing for Efficient Fine-Grained Management of Specific Services in SDN”.  Accepted by SciSec 2022 (The 4th International Conference on Science of Cyber Security, 10-12 August,  Matsue city, Shimane, Japan), 2022.
  5. Jiazhi Liu and Feng Liu "Robust Stereo Matching with an Unfixed and Adaptive Disparity Search Range". Accepted by ICPR 2022 (26TH International Conference on Pattern Recognition August 21-25, Montréal Québec), 2022.
  6. Jiazhi Liu and Feng Liu "A novel stereo matching pipeline with robustness and unfixed disparity search range ". Accepted by ICME 2022 (IEEE International Conference on Multimedia and Expo 2022 , 11-15 July,  Taipei, China ), 2022.
  7. Zixian Tang, Qiang Wang, Wenhao Li, Huaifeng Bao, Wen Wang and Feng Liu "Mining Trojan Detection Based on Multi-dimensional Static Features". Accepted by SciSec 2021 (The 3rd International Conference on Science of Cyber Security, 13-15 August,  Shanghai, China ), 2021.
  8. Zixian Tang, Qiang Wang, Wenhao Li, Huaifeng Bao, Wen Wang and Feng Liu "HSLF: HTTP Header Sequence based LSH fingerprints for Application Traffic Classification". Accepted by ICCS 2021 (International Conference on Computational Science, 16-18 June, Krakow, Poland), 2021.
  9. Yaqin Zhang, Duohe Ma, Xiaoyan Sun, Kai Chen, Feng Liu "What You See Is Not What You Get: Towards Deception-Based Data Moving Target Defense". Accepted by IEEE IPCCC 2020(39th IEEE -- International Performance Computing and Communications Conference, 6- 8 November, Virtual Conference), 2020.
  10. Yaqin Zhang, Duohe Ma, Xiaoyan Sun, Kai Chen, Feng Liu "WGT: Thwarting Web Attacks Through Web Gene Tree-based Moving Target Defense". Accepted by ICWS 2020 (IEEE International Conference on Web Services, October 19-23, Beijing, China), 2020.
  11. Dingyu Yan, Feng Liu. A Heuristic Method for Network Modification against Cyber Epidemic Attacks. Accepted by TrustCom2019 (18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Rotorua, New Zealand from 5 - 8 August), 2019.
  12. Dingyu Yan, Feng Liu, Kun Jia. Modeling an Information-based Advanced Persistent Threat Attack on the Internal Network. Accepted by ICC2019 (IEEE International Conference on Communications, Shanghai, China, 20-24 May), 2019.
  13. Dingyu Yan, Feng Liu, Yaqin Zhang, Kun Jia, and Yuantian Zhang. Characterizing the Optimal Attack Strategy Decision in Cyber Epidemic Attacks with Limited Resources. Accepted by SciSec2018 (1st International Conference on Science of Cyber Security, Beijing, China, 12-14 August), 2018.
  14. Wen Wang, Feng Liu, Teng Guo and Yawei Ren. Temporal Integration Based Visual Cryptography Scheme and Its Application. IWDW2017 (16th International Workshop on Digital-forensics and Watermarking, Magdeburg, Germany 23-25 August), LNCS 10431, pages 406-419, 2017.
  15. Wenlun Pan, Zhenzhen Bao, Dongdai Lin and Feng Liu. The Distribution of $2^n$-Periodic Binary Sequences with Fixed $k$-Error Linear Complexity. ISPEC2016 (12th International Conference on Information Security Practice and Experience , Zhangjiajie, China, 16-18 November), LNCS 10060, pages 13-36, 2016.
  16. Wenlun Pan, Zhenzhen Bao, Dongdai Lin and Feng Liu. The Linear Complexity and $2$-error Linear Complexity Distribution of $2^n$-Periodic Binary Sequences with Fixed Hamming Weight . ICICS2016 (18th IEEE International Conference on Information and Communications Security, Singapore, 29 november-2 December), LNCS 9977, pages 107-123, 2016.
  17. Teng Guo, Feng Liu and Wen Wang. Privacy monitor. IWDW2016 (15th International Workshop on Digital-forensics and Watermarking, Beijing, China 17-19 September),  LNCS 10082, pages 187-197, 2017.
  18. Gang Shen, Feng Liu, Zhengxin Fu and Bin Yu. Halftone Visual Cryptography with Complementary Cover Images. IWDW2016 (15th International Workshop on Digital-forensics and Watermarking, Beijing, China 17-19 September), LNCS 10082, pages 223-237, 2017.
  19. Yawei Ren, Feng Liu and Wen Wang. Collusive Attacks to Partition Authentication Visual Cryptography Scheme. IWDW2016 (15th International Workshop on Digital-forensics and Watermarking, Beijing, China 17-19 September), LNCS 10082, pages 238-250, 2017.
  20. Wen Wang, Feng Liu, Teng Guo, Yawei Ren and Gang Shen. Information Security Display Technology with Cheating Effect. IWDW2016 (15th International Workshop on Digital-forensics and Watermarking, Beijing, China 17-19 September), LNCS 10082, pages 198-208, 2017.
  21. Jiaxin Yin, Rui Wang, Yuanfang Guo and Feng Liu. An Adaptive Reversible Data Hiding Scheme for JPEG Images. IWDW2016 (15th International Workshop on Digital-forensics and Watermarking, Beijing, China 17-19 September), LNCS 10082, pages 456-469, 2017.
  22. Weiqi Yan and Feng Liu, Event Analogy Based Privacy Preservation in Visual Surveillance. International Workshop on Video Surveillance of The 7th Pacific-Rim Symposium on Image and Video Technology (PSIVT 2015),  Auckland, New Zealand 23-27 November), LNCS 9555, pages 357-368, 2016.
  23. Wen Wang, Feng Liu, Wei Qi Yan, Gang Shen and Teng Guo. An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion. IWDW2015 (14th International Workshop on Digital-forensics and Watermarking, Tokyo, Japan 7-10 October), LNCS 9569, pages 418-432, 2016.
  24. Yawei Ren, Feng Liu, Dongdai Lin, Rongquan Feng and Wen Wang. A New Construction of Tagged Visual Cryptography Scheme . IWDW2015 (14th International Workshop on Digital-forensics and Watermarking, Tokyo, Japan 7-10 October), LNCS 9569, pages 433-445, 2016.
  25. Guangyu Wang, Feng Liu and Weiqi Yan. Braille For Visual Cryptography. ISM2014 (IEEE International Symposium on Multimedia, Taichung, Taiwan December 10-12, 2014). IEEE, pages 175-276, 2014.
  26. Feng Liu and Chuankun Wu. Optimal XOR based (2,n)-Visual Cryptography Schemes. Accepted by IWDW2014, full version of the paper also available at ePrint Archive 2010/545, 2014.(slides)
  27. Teng Guo, Feng Liu, Chuankun Wu, Young-Chang Hou, Yawei Ren and Wen Wang, The Security Defect of a Multi-pixel Encoding Method. ISC2013 (The 16th Information Security Conference, Dallas, Texas, November 13-15, 2013), LNCS 7807, pages39-48, 2015.
  28. Teng Guo, Feng Liu and ChuanKun Wu, On (k, n) Visual Cryptography Scheme with Several Essential Parties. ICITS 2013 (The 7th International Conference on Information Theoretic Security, November 28-30, 2013, NTU, Singapore), LNCS pages 56-68, 2014.
  29. Teng Guo, Feng Liu, Chuankun Wu and Ching-Nung Yang, Threshold Secret Image Sharing. Accepted by ICICS 2013 (15th International Conference on Information and Communications Security, 20-22 November 2013, Beijing, China). LNCS 8233, pages 404-412, 2013.
  30. Teng Guo, Feng Liu, Chuankun Wu, Yawei Ren and Wen Wang. On the Randomness of Visual Cryptography Scheme. Processing of IIH-MSP2013 IEEE, pp. 391-394  (The Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, October 16-18, 2013, Beijing, China).
  31. Teng Guo, Feng Liu and Chuankun Wu. Visual Cryptography for Natural Images and Visual Voting. Inscrypt2012  (The 8th China International Conference on Information Security and Cryptology), Beijing, China, Nov. 28 - Dec. 1, 2012. LNCS 7763, pages 90-101, 2013.
  32. Feng Liu, Weiqi Yan, Peng Li and Chuankun Wu. A Secret Enriched Visual Cryptography Scheme. Accepted by IWDW 2012 (11th International Workshop on Digital-forensics and Watermarking), Lecture Notes in Computer Science Volume 7809, 2013, pp 464-484, Shanghai China, 31 Oct.-3 Nov. 2012. LNCS 7809, pages 464-484, 2013. (slides)
  33. Teng Guo, Feng Liu and Chuankun Wu. On the Equivalence of Two Definitions of Visual Cryptography Scheme. ISPEC 2012, pages 217-227, LNCS 7232, Hangzhou, China, April 9-12, 2012.
  34. Feng Liu, Teng Guo, Chuankun Wu and Ching-Nung Yang. Flexible Visual Cryptography Scheme Without Distortion. IWDW2011 (10th International Workshop on Digital-forensics and Watermarking), Lecture Notes in Computer Science, volume 7128/2012, pages 211-227, Atlantic City USA, 23-26 October 2011.(slides)
  35. Teng Guo, Feng Liu and Chuankun Wu. Multi-pixel Encryption Visual Cryptography. Inscrypt2011,Lecture Notes in Computer Science 7537(2012), pp.86-92, Beijing China, 30 November - 3 December 2011.
  36. Qinggang Yue, Rui Xue and Feng Liu. Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attack. INTRUST2011, LNCS 7222(2012), pages 84-101, Beijing China, 27-29 November 2011.
  37. Jianhua Peng, Feng Liu, Zhenju Zhao, Danqing Huang and Rui Xue. Layered model checking of Kerberos protocol. Accepted by CryptoForma'11, Limerick UK, on 21 June 2011.
  38. Zhenju Zhao, Feng Liu, Jianhua Peng, Danqing Huang, Rui Xue and Zhenfeng Zhang. Some Improvements on Model Checking CoreASM Specifications of Security Protocols. ISDPE 2010 (The 2nd International Symposium on Data, Privacy and E-Commerce), pp. 66-71, Buffalo/Niagara Falls USA on Sept 13th-14th 2010. (AR=10%)
  39. Danqing Huang, Rui Xue, Feng Liu, Jianhua Peng, Zhenju Zhao and Dongyao Ji. Formal Verification of HMQV Using ASM-SPV. IIH-MSP 2010 (The Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing), pp. 458-461, Darmstadt, Germany on October 15-17, 2010.
  40. Jianhua Peng, Feng Liu, Zhenju Zhao, Danqing Huang and Rui Xue. ASM-SPV: A Model Checker for Security Protocols. IIH-MSP 2010 (The Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing), pp. 486-489, Darmstadt, Germany on October 15-17, 2010.
Articles and Essays
  1. Weixia Cai, Feng Liu, Analysis and Thinking on the Construction of NSA Network Security Science Laboratory 美国国家安全局网络安全科学实验室建设的分析与思考,《中国信息安全》,2022.
  2. Yugang Jiang, Feng Liu, Wenlian Lu, Kun Sun, Lingyu Wang, Shouhuai Xu, Moti Yung, Where are Cybersecurity Boundaries? Panel discussion of SciSec 2021.
  3. Bo Liu, Feng Liu, Gene Tsudik, Jia Xu, Jingguo Wang, Moti Yung, Shouhuai Xu, Future Research Directions towards Science of Cyber Security. Panel discussion of SciSec 2019.
  4. Lan Pi, Feng Liu, Dongdai Lin, A Preliminary Understanding of the Privacy Protection In the Big Data Era. China Information Security, volume 9, pages 90-93, 2015. 皮兰、刘峰、林东岱,大数据时代的隐私保护初探,《中国信息安全》,期9,页90-93,2015。
  5. Huashan Chen, Lan Pi, Feng Liu, Dongdai Lin "Research Frontier and Trends of Science of Cybersecurity", volume 3, pages 1-5, 2015. 陈华山、皮兰、刘峰、林东岱,网络空间安全科学基础的研究前沿及发展趋势,《信息网络安全》,第3期,第1-5页,2015。
  6. Feng Liu and Miao Liu "Comments on the FICIC framework of USA" China Information Security. To appear. 刘峰、刘淼, 美国《FICIC框架》及其影响力分析,《中国信息安全》,2014。
  7. Wenhao Wang, Feng Liu, Qian Zhao, From MH370 to the Protection of Critical Infrastructure in China. China Information Security, volume 6, pages 98-101, 2014. 王文浩、刘峰、赵倩,从MH370事件看我国关键基础设施保护,《中国信息安全》,期6,页98-101,2014。
  8. Qian Zhao, Feng Liu and Dongdai Lin. About the National Initiative for Cybersecurity Education of the United States.  China Information Security, volume 8, pages 91-94, 2014. 赵倩、刘峰、林东岱,美国网络空间安全教育战略计划,《中国信息安全》,第8期,第91-94页, 2014。
  9. Dongdai Lin and Feng Liu. A Preliminary Understanding of the United States Information Security System. Security Science and Technology, volume 7, pages 6-13, 2012. 林东岱、刘峰,美国信息安全保密体系初探,《保密科学与技术》,卷7,页6-13,2012。
Talks Given to Public
  1. "Strategic Research of Cybersecurity",  Chendu Library and Information Center, Chengdu, China, Nov. 20, 2017.
  2. "Strategic Research of Cybersecurity",  Guizhou Normal University, Guiyang, China, Mar. 10, 2017.
  3. "Strategic Research of Cybersecurity", Seminar of Strategic Research of Chinese Academy of Engineering, Haikou, China, Feb. 4, 2016.
  4. "Overview of the Cybersecurity System in USA", CN-CERT, Beijing China, Jan. 12 2016.
  5. "Visual Security", Auckland University of Technolgoy, Auckland, New Zealand, Nov. 2015.
  6. Audioslides for "Improving the visual quality of size invariant visual cryptography scheme", for the Top 25 viewed papers in Journal of Visual Communication and Image Representation, 2013.
  7. "A Brief Introduction of CAS & IIE & SKLOIS & VC", Auckland University of Technology, Oct. 1 2013.
  8. "A Secret Enriched Visual Cryptography Scheme", IWDW 2012 (11th International Workshop on Digital-forensics and Watermarking), Shanghai China, 31 Oct.-3 Nov. 2012.
  9. "Flexible Visual Cryptography Scheme Without Distortion", IWDW2011, Atlantic City USA, October 23-26, 2011.
  10. "On the progress of Visual Cryptography" (In Chinese), to appear in CASC2010, Jinan China, August, 21-23, 2010.
  11. "Design and Realization of ASM-SPV for Analyzing Security Protocols" (In Chinese), to appear in NASAC2010 or Journal of Software, Suzhou China, November, 5-6, 2010.
  12. Some Improvements on Model Checking CoreASM Specifications of Security Protocols, ISDPE 2010, Buffalo/Niagara Falls USA on Sept 13th-14th 2010.
  13. "Color Visual Cryptography Schemes." (In Chinese), 2nd Conference on Computer Mathematics, Qingdao China, October, 24-26, 2008.
Teaching
  1. "Cybersecurity stragety research, School of Cybersecurity, University of Chinese Academy of Sciences. 2022.2-2022.5.
  2. "Cybersecurity stragety research, School of Cybersecurity, University of Chinese Academy of Sciences. 2021.2-2021.5.
  3. "Cybersecurity stragety research, School of Cybersecurity, University of Chinese Academy of Sciences. 2020.2-2020.5.
  4. "Cybersecurity stragety research, School of Cybersecurity, University of Chinese Academy of Sciences. 2019.2-2019.5.
  5. "Cybersecurity stragety research, School of Cybersecurity, University of Chinese Academy of Sciences. 2018.2-2018.5.
  6. "Cybersecurity stragety research, School of Cybersecurity, University of Chinese Academy of Sciences. 2017.2-2017.5.

 

Patents
  1. “Real-time network connection privacy protection method and system based on anti disturbance” with application No. 202210622904.2. 基于对抗扰动的实时网络连接隐私保护方法和系统, 2022.
  2. “A method and device for lightweight malware traffic detection based on optimized meta learning” with application No. 202210547678.6. 基于优化元学习的轻量恶意软件流量检测方法及装置, 2022.
  3. “A Method and System for Identifying and Classifying Encrypted Traffic Based on Direct Push Graph” with application No. 202210440703.0. 基于直推图的加密流量识别与分类方法及系统, 2022.
  4. “Classification method and system of encrypted traffic in different network environments based on graph matching” with application No. 202210397693.7. 基于图匹配的不同网络环境的加密流量分类方法及系统, 2022.
  5. "A 2D-3D synchronous display method and system" with No. 202110172879.8. 2D-3D同步显示方法及系统, 2021.
  6. “A method for secure display and the security display system with cheating prevention ” with Application No.2017107899619. 防偷窥的安全显示方法、具有欺伪效果的安全显示方法及安全显示系统 , 2017.
  7. “A method of constructing of visual cryptography based privacy protecting display” with No.201410542752.0 . 一种基于视觉密码的隐私保护显示器实现方法, 2014.
  8. “A visual cryptography based visual anti-copying technique”, with No. 201210075522.9, 2012. 一种基于视觉密码的可视防复印技术,专利号201210075522.9, 2012.
  9. “A method of formal analyzing security protocols”, with No. 201010578947.2, 2010. 一种安全协议的形式化分析方法,专利号 201010578947.2, 2010.
Software copyrights
  1. “ASM-SPV: Abstract State Machines based Security Protocol Verifier”, with software copyright license No. 2010SRBJ1727, 2010.
  2. “SSPV: Symbolic Security Protocol Verifier”, with software copyright license No. 2011SR013510, 2011.
 
  Research projects
  1. "Youth Innovation Promotion Association", Chinese Academy of Sciences, 2013-2017.
  2. "Strategic Priority Research Program" of the Chinese Academy of Sciences, 2012-2016.
  3. GF Innovation Program of the Chinese Academy of Sciences, 2015-2016.
  4. National Top Think Tank Pilot Major Projects, 2016.
  5. National Natural Science Foundation of China, No. 61671448, 2017-2020.
  6. "Strategic Priority Research Program II" of the Chinese Academy of Sciences, 2019-2024.
  7. China-New Zealand Scientist Exchange Programme, 2013.
  8. National Natural Science Foundation of China, No. 60903210, 2010-2012.
  9. Knowledge Innovation Program of the Chinese Academy of Sciences.
  10. Innovation Projects of Institute of Information Engineering.
  11. Young Talents Project of Institute of Information Engineering.
 
 
Most of my academic papers and patents are listed in this page. To further access the draft, please email me.