| |
|

|
Books & Chapters Monographs
- Feng Liu and Weiqi Yan. Visual Cryptography for Image Processing
and Security - Theory, Methods, and Applications . Springer-Verlag
London, 2014. (e-version,
and 2nd
Edition 2015)
- Feng Liu etc. Overview of the Cybersecurity System in USA.
Science Press, 2015. 刘峰等著,《美国网络空间安全体系》,科学出版社,2015。
Books Edited
- Chunhua Su, Kouichi Sakurai, Feng Liu. Proceedings of 4th
International Workshop on Science of Cybersecurity, SciSec2022,
Matsue, Japan, August 10–12, 2022.Lecture Notes in Computer Science (LNCS, volume 13580) (e-version)
- Wenlian Lu, Kun Sun, Moti Yung, Feng Liu. Proceedings of 3rd
International Workshop on Science of Cybersecurity, SciSec2021,
Shanghai, China, August 13-15, 2021.Lecture Notes in Computer Science (LNCS, volume 13005) (e-version)
- Feng Liu, Jia Xu, Shouhuai Xu, Moti Yung. Proceedings of 2st
International Workshop on Science of Cybersecurity, SciSec2019,
Nanjing, China, August 9-11, 2019. Lecture Notes in Computer Science (LNCS, volume 11933)(e-version)
- Feng Liu, Shouhuai Xu, Moti Yung. Proceedings of 1st
International Workshop on Science of Cybersecurity, SciSec2018,
Beijing, China, August 12-14, 2018. Lecture Notes in Computer Science (LNCS, volume 11287)(e-version)
- Shi, Y.Q., Kim, H.J., Perez-Gonzalez, F., Liu, F. Proceedings of
15th International Workshop on Digital Forensics and Watermarking, IWDW2016, Beijing, China, September
17-19, 2016. (e-version)
- Feng Liu and Weiqi Yan. Special Issue on Visual Cryptography of
Springer Transactions on Data Hiding and Multimedia Security. Contains
7 papers selected from 21 submissions, Springer LNCS 8363 , 2014. (e-version)
- Dongdai Lin, Feng Liu. Special Issue on cryptography of
Communications of the CCISA. Contains 4 review and progress
articles. To appear in 2015.
Chapters
- Feng Liu. Chapter 3: Cryptology and security protocol", in book
"Security Fundamentals of Internet of Things, pages 30-75. Science Press, 2013.刘峰,密码学与安全协议基础,《物联网安全基础》,页30-75,科学出版社,2013。
- Feng Liu. The optimization problem of visual cryptography
scheme. In book "10000 Selected Problems in Sciences Information
Sciences", Science Press, 2011.刘峰,视觉密码方案的最优化问题,《10000个科学难题?#20449;息科学卷》,科学出版社,2011。
- Feng Liu. Resolving the Alignment Problem in Visual
Cryptography. In book "Visual
Cryptography and Secret Image Sharing", pages 297-328, CRC press Taylor &
Francis LLC, ISBN: 9781439837214 , 2011.
- Feng Liu. On the progress of Visual Cryptography. In book
"Progress of Cryptography in China", pages 32-67, Publishing House
of Electronics Industry, 2010. 刘峰,视觉密码学研究进展,《中国密码学发展报告2010
》,页32-67,电子工业出版社,2010.
- Feng Liu. Visual Cryptography. To appear in Dictionary of
Mathematics, 2013. 刘峰,视觉密码学,《数学大词典》,2013.
|
|
 |
Journal Papers
- Faqi Zhao, Wenhao Li, Huaifeng Bao, Zhaoxuan Li, Guoqiao
Zhou, Wen Wang and Feng Liu. Nüwa: Enhancing Network Traffic
Analysis With Pre-Trained Side-Channel Feature Imputation.
IEEE Transactions on Networking, 2025.(CCF-A)
- Huashan Chen, Zisheng Huang, Yifan Xu, Wenjie Huang,
Xuheng Wang, Jinfu Chen, Haotang Li, Kebin Peng, Feng Liu
and Sen He. "Unveiling code clone patterns in open source VR
software: an empirical study." Automated Software
Engineering 32.2 (2025): 72.(CCF-B)
- Huaifeng Bao, Wenhao Li, Huashan Chen, Han Miao, Zixian
Tang, Feng Liu and Wen Wang. "Stories behind decisions:
Towards interpretable malware family classification with
hierarchical attention." Computers & Security 144 (2024):
103943.(CCF-B)
- Zhiwei Wang, Feng Liu, Siuming Yiu and Longwen Lan "Online/Offline and History Indexing
Identity-Based Fuzzy Message Detection". IEEE Transactions on Information Forensics and Security, Volume: 18, pages 5553-5566, 2023.(CCF-A).
- Jiazhi Liu and Feng Liu "Modified 2D-Ghost-Free
Stereoscopic Display with Depth-of-Field Effects". ACM
Transactions on Multimedia Computing, Communications and
Applications 19.1s (2023): 1-16.(CCF-B).
- Yaqin Zhang, Duohe Ma, Xiaoyan Sun, Chuan Zhou, Feng Liu
"A Study on Deception-based Moving Target Defense", accepted
by Journal of Cybersecurity(in Chinese), 2021.
张雅勤,马多贺,Xiaoyan Sun,
周川,刘峰,基于网络空间欺骗的移动目标防御技术研究,《信息安全学报》2021。(CCF-B)
- Kun Jia, Junnan Wang, Feng Liu "DDoS detection and
mitigation Framework in SDN", accepted by Journal of
Cybersecurity(in Chinese), 2020. 贾锟、 王君楠、刘峰, SDN环境下的DDoS检测与缓解机制,《信息安全学报》2020。(CCF-B)
- Liyan Liu, Feng Liu, Yanyan Zou, Jianhua Zhou, Aihua
Piao, Feng Liu, Wei Huo "SiCsFuzzer: A
Sparse-instrumentation-based Fuzzing Platform for Closed
Source Software", accepted by Journal of Cybersecurity(in
Chinese), 2020.
刘丽艳、李丰、邹燕燕、周建华、朴爱华、刘峰、霍玮,SiCsFuzzer:基于稀疏插桩的闭源软件模糊测试方法,《信息安全学报》2020。(CCF-B)
- Dingyu Yan, Feng Liu, Yaqin Zhang, Kun Jia "Dynamical
model for individual defence against cyber epidemic attacks
", accepted by IET Information Security, 2019.(CCF-C)
- Yawei Ren, Feng Liu, Weiqi Yan and Wen Wang. A New
Visual Evaluation Criterion of Visual Cryptography Scheme
for Character Secret Image. Multimedia Tools and
Applications, volume 78 (18), pages 25299–25319,2019. (CCF-C)
- Tao Xu, Chuankun Wu, Feng Liu, Ruoxin Zhao "Protecting
White-Box Cryptographic Implementations with Obfuscated
Round Boundaries", SCIENCE CHINA Information Sciences,
volume 61, issue 3, pages 237-239, 2018.(CCF-A)
- Gang Shen, Feng Liu, Zhengxin Fu and Bin Yu "Visual
Cryptograms of Random Grids via Linear Algebra", Multimedia
Tools and Applications, volume 77, issue 10, pages
12871-12899, 2018. (CCF-C)
- Tao Xu, Feng Liu and Chuankun Wu "A White-Box AES-Like
Implementation Based on Key-Dependent Substitution-Linear
Transformations", Multimedia Tools and Applications, volume
77, pages 18117–18137, 2018. (CCF-C)
- Xiaotian Wu, Weiqi Yan and Feng Liu, "Progressive
Scrambling for Social Media", International Journal of
Digital Crime and Forensics, volume 10, issue 2, pages
56–73,2018.
- Huashan Chen, Xiuyan Zhao, Feng Liu, Shouhuai Xu and
Wenlian Lu "Optimizing interconnections to maximize the
spectral radius of interdependent networks", Physical Review
E, volume 95, 032308 , 2017.
- Teng Guo, Jian Jiao, Feng Liu and Wen Wang "On the Pixel
Expansion of Visual Cryptography Scheme" International
Journal of Digital Crime and Forensics, volume 9 issue 2,
pages 38-44, , 2017.
- Gang Shen, Feng Liu, Zhengxin Fu and Bi-n Yu "Perfect
Contrast XOR-based Visual Cryptography Schemes via Linear
Algebra", Designs, Codes and Cryptography, volume 85, issue
1, pages 15-37, 2017.(CCF-B)
- Gang Shen, Feng Liu, Zhengxin Fu and Bin Yu "New insight
into linear algebraic technique to construct visual
cryptography scheme for general access structure",
Multimedia Tools and Applications , volume 54, pages
140-151, 2017.(CCF-C)
- Yawei Ren, Feng Liu etc. "Cheating prevention visual
cryptography scheme using Latin square" IET Information
Security, volume 11 issue 4, page 211-219, 2017.(CCF-C)
- Guangyu Wang, Feng Liu, Weiqi Yan "Basic Visual
Cryptography Using Braille" International Journal of Digital
Crime and Forensics, volume 8 issue 3, pages 85-93, , 2016.
- Guangyu Wang, Feng Liu, Weiqi Yan "2D Barcodes for
Visual Cryptography" Multimedia Tools and Applications,
volume 75, issue 2, pages 1223-1241, November, 2014. (DOI)(CCF-C)
- Teng Guo, Feng Liu and Chuankun Wu. k out of k extended
visual cryptography scheme by random grids. Signal
Processing (Elsevier), volume 94, pages 90–101, January
2014.(CCF-B)
- Feng Liu, Weiqi Yan, Peng Li and Chuankun Wu. ESSVCS: An
Enriched Secret Sharing Visual Cryptography. Springer
Transactions on Data Hiding and Multimedia Security, LNCS
8363, pages 1-24, 2014.
- Feng Liu, Teng Guo, Chuankun Wu and Ching-Nung Yang.
Flexible Visual Cryptography Scheme Without Distortion and
Its Application. Springer Transactions on Data Hiding and
Multimedia Security, LNCS 8363, pages 110-130, 2014.
- Teng Guo, Feng Liu and Chuankun Wu. Threshold visual
secret sharing by random grids with improved contrast.
Journal of Systems and Software, volume 86, issue 8, pages
2094–2109, 2013.(CCF-B)
- Feng Liu, Teng Guo and Chuankun Wu and Lina Qian.
Improving the Visual Quality of Size Invariant Visual
Cryptography Scheme. Journal of Visual Communication and
Image Representation, volume 23, pages 331-342, 2012.(CCF-C)
- Feng Liu and Chuankun Wu. Embedded Extended Visual
Cryptography Schemes. IEEE Transactions on Information
Forensics & Security, volume 6, No. 2, pages 307-322, 2011,
also available at ePrint Archive 2010/439.(CCF-A)
- Feng Liu, Chuankun Wu and Xijun Lin. Cheating Immune
Visual Cryptography Scheme. IET Information Security, volume
5, issue 1, pages 51-59, 2011.(CCF-C)
- Ching-Nung Yang, Chih-Cheng Wu and Feng Liu.
Construction of General (k, n) Probabilistic Visual
Cryptography Schemes. Journal of Electronic Science and
Technology, volume 9, No. 4, pages 317-324, 2011.
- Peng Li, Peijun Ma and Feng Liu. Multi-Threshold Image
Secret Sharing Scheme. Journal of Electronics, volume 40,
issue 3, pages 518-524, 2012.
李鹏、马培军、刘峰,多重门限的图像秘密共享方案,《电子学报》,卷40,期3,页518-524,2012。(CCF-A)
- Junqing Liang, XiJun Lin and Feng Liu. CLPKE: Against A
Variation of Key Replacement Attack without Bilinear
Pairing. JCIT: Journal of Convergence Information
Technology, volume 7, No. 3, pages 137-145, 2012.
- Feng Liu, Chuankun Wu and Xijun Lin. Step Construction
of Visual Cryptography Schemes. IEEE Transactions on
Information Forensics & Security, volume 5, No. 1, pages
27-38, 2010. (CCF-A)
- Feng Liu, Chuankun Wu and Xijun Lin. A New Definition of
the Contrast of Visual Cryptography Scheme. Information
Processing Letters, volume 110, pages 241-246, 2010.(CCF-C)
- Feng Liu, Chuankun Wu and Xijun Lin. Some Extensions on
Threshold Visual Cryptography Schemes. The Computer Journal,
volume 53, issue 1, pages 107-119, 2010.(CCF-B)
- Feng Liu and Chuankun Wu. A Robust Visual Cryptography
Based Watermarking Scheme for Multiple Cover Images and
Multiple Owners. IET Information Security, volume 5, issue
2, pages 121–128, 2010.(CCF-C)
- Feng Liu, Chuankun Wu and Xijun Lin. The Alignment
Problem of the Visual Cryptography Scheme. Designs, codes
and cryptography, volume 50, issue 2, pages 215-227, 2009.(CCF-B)
- Xijun Lin, Chuankun Wu and Feng Liu. Many-to-one
Encryption and Authentication Scheme and Its Application"
Journal of Communications and Networks Volume 10, No. 1,
pages 18-27, 2008.
- Xijun Lin, Chuankun Wu and Feng Liu. Analysis of An
Authenticated Identity-based Multicast Scheme. IET
Proceedings-Communications Volume 2, issue 7, pages 935-937,
2008.
- Feng Liu, Chuankun Wu and Xijun Lin. Colour Visual
Cryptography Schemes. IET Information Security Volume 2,
issue 4, pages 151-165, 2008.(CCF-C)
- Feng Liu, Peng Li and Chuankun Wu. Encrypting More
Information in Visual Cryptography Scheme. available at
ePrint Archive 2011/340, 2011. An updated version of the
paper has been accepted to be published in IWDW2012.
|
Conference Papers
- Lijia Lv, Weigang Zhang, Xuehai Tang, Jie Wen, Feng Liu and Jizhong Han. "Adappa: Adaptive position pre-fill jailbreak attack approach targeting llms." ICASSP 2025-2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2025.(CCF-B)
- Xingyu Wang, Han Miao, Zhaoxuan Li, Wen Wang and Feng Liu.
"Towards Automatic Rule Extraction for Intrusion Detection with Explainable AI"
Accepted by IJCNN2025, 2025 International Joint Conference on Neural Networks (IJCNN). IEEE, 2025.(CCF-C)
- Faqi Zhao, Rong Shi, Guoqiao Zhou, Wen Wang and Feng Liu. "KVT-Payload: Knowledge Graph-Enhanced Hierarchical Vulnerability Traffic Payload Generation." International Conference on Information and Communications Security. Singapore: Springer Nature Singapore, 2025.(CCF-C)
- Xiaowei Hu, Haoning Chen, Huaifeng Bao, Wen Wang, Feng Liu, Guoqiao Zhou and Peng Yin.
"A LLM-based agent for the automatic generation and generalization of IDS rules."
2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024.(CCF-C)
- Yuantian Zhang, Weixia Cai, Huashan Chen, Zhenyu Qi, Hong Chen, Feng Liu and Sen He.
"A Learning-Based POMDP Approach for Adaptive Cyber Defense Against Multi-Stage Attacks."
2024 IEEE International Conference on High Performance Computing and Communications (HPCC). IEEE, 2024.(CCF-C)
- Xingyu Wang, Huaifeng Bao, Wenhao Li, Haoning Chen, Wen Wang and Feng Liu.
"A Framework for Intelligent Generation of Intrusion Detection Rules Based on Grad-CAM." Accepted by ICCS 2024
(The 24th International Conference on Computational Science, Malaga, Spain, July 2-4, 2024), pp. 147-161 2024.(CCF-B)
- Faqi Zhao, Duohe Ma, Wenhao Li, Feng Liu and Wen Wang.
"Poster: Enhancing Network Traffic Analysis with Pre-trained Side-channel Feature Imputation."
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (CCS2024). 2024.(CCF-A)
- Huaifeng Bao, Wenhao Li, Zhaoxuan Li, Han Miao, Wen Wang and Feng Liu.
"Poster: PGPNet: Classify APT Malware Using Prediction-Guided Prototype Network."
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (CCS2024). 2024.(CCF-A)
- Weixia Cai, Hong Chen, Huashan Chen and Feng Liu. "Optimal Defense Strategy for Multi-agents Using Value Decomposition Networks." International Conference on Intelligent Computing. Singapore: Springer Nature Singapore, 2024.(CCF-C)
- Huaifeng Bao, Xingyu Wang, Wenhao Li, Jinpeng Xu, Peng Yin and Wen Wang.
"CAFE: Robust Detection of Malicious Macro based on Cross-modal Feature Extraction."
2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD).
IEEE, 2024.(CCF-C)
- Weixia Cai, Huashan Chen, Han Miao, Feng Liu, Yong Zhang and Xiaojia Yang.
"A Vulnerability-Driven Gym for Training Autonomous Cyber Agents with Reinforcement Learning"
2024 IEEE Smart World Congress (SWC), IEEE, 2024.
- Bao, Huaifeng, Wen Wang, and Feng Liu.
"Towards open-set apt malware classification under few-shot setting."
GLOBECOM 2023-2023 IEEE Global Communications Conference. IEEE, 2023.(CCF-C)
- Huaifeng Bao, Li Wenhao, Xingyu Wang, Zixian Tang, Wen
Wang and Feng Liu "Payload Level Graph Attention Network for
Web Attack Traffic Detection". Accepted by ICCS 2023 (The
23rd International Conference on Computational Science,
Prague, Czechia, on 3-5 July 2023), pp.394-407, 2023.(CCF-B)
- Yuantian Zhang, Feng Liu and Huashan Chen "Optimal
Strategy Selection for Cyber Deception via Deep
Reinforcement Learning" Accepted by IEEE UIC 2022 (The 2022
IEEE International Conference on Ubiquitous Intelligence and
Computing, 15-18 December, Haikou China), 2022.(CCF-C)
- Kun Jia, Jiazhi Liu, Wen Wang and Feng Liu. “Hybrid
Routing for Efficient Fine-Grained Management of Specific
Services in SDN”. Accepted by SciSec 2022 (The 4th
International Conference on Science of Cyber Security, 10-12
August, Matsue city, Shimane, Japan), 2022.(IIE-C)
- Jiazhi Liu and Feng Liu "Robust Stereo Matching with an
Unfixed and Adaptive Disparity Search Range". Accepted by
ICPR 2022 (26TH International Conference on Pattern
Recognition August 21-25, Montréal Québec), 2022. (CCF-C)
- Jiazhi Liu and Feng Liu "A novel stereo matching
pipeline with robustness and unfixed disparity search range
". Accepted by ICME 2022 (IEEE International Conference on
Multimedia and Expo 2022 , 11-15 July, Taipei, China ),
2022.(CCF-B)
- Zixian Tang, Wenhao Li, Huaifeng Bao, Wen Wang and Feng
Liu "Mining Trojan Detection Based on Multi-dimensional
Static Features". Accepted by SciSec 2021 (The 3rd
International Conference on Science of Cyber Security, 13-15
August, Shanghai, China ), 2021.(IIE-C)
- Zixian Tang, Wenhao Li, Huaifeng Bao, Wen Wang and Feng
Liu "HSLF: HTTP Header Sequence based LSH fingerprints for
Application Traffic Classification". Accepted by ICCS 2021
(International Conference on Computational Science, 16-18
June, Krakow, Poland), 2021.
- Yaqin Zhang, Duohe Ma, Xiaoyan Sun, Kai Chen, Feng Liu
"What You See Is Not What You Get: Towards Deception-Based
Data Moving Target Defense". Accepted by IEEE IPCCC
2020(39th IEEE -- International Performance Computing and
Communications Conference, 6- 8 November, Virtual
Conference), 2020.(CCF-C)
- Yaqin Zhang, Duohe Ma, Xiaoyan Sun, Kai Chen, Feng Liu "WGT:
Thwarting Web Attacks Through Web Gene Tree-based Moving
Target Defense". Accepted by ICWS 2020 (IEEE International
Conference on Web Services, October 19-23, Beijing, China),
2020.
- Dingyu Yan, Feng Liu. A Heuristic Method for Network
Modification against Cyber Epidemic Attacks. Accepted by
TrustCom2019 (18th IEEE International Conference on Trust,
Security and Privacy in Computing and Communications,
Rotorua, New Zealand from 5 - 8 August), 2019.(CCF-C)
- Dingyu Yan, Feng Liu, Kun Jia. Modeling an
Information-based Advanced Persistent Threat Attack on the
Internal Network. Accepted by ICC2019 (IEEE International
Conference on Communications, Shanghai, China, 20-24 May),
2019. (CCF-C)
- Dingyu Yan, Feng Liu, Yaqin Zhang, Kun Jia, and Yuantian
Zhang. Characterizing the Optimal Attack Strategy Decision
in Cyber Epidemic Attacks with Limited Resources. Accepted
by SciSec2018 (1st International Conference on Science of
Cyber Security, Beijing, China, 12-14 August), 2018. (IIE-C)
- Wen Wang, Feng Liu, Teng Guo and Yawei Ren. Temporal
Integration Based Visual Cryptography Scheme and Its
Application. IWDW2017 (16th International Workshop on
Digital-forensics and Watermarking, Magdeburg, Germany 23-25
August), LNCS 10431, pages 406-419, 2017.(CCF-C)
- Wenlun Pan, Zhenzhen Bao, Dongdai Lin and Feng Liu. The
Distribution of $2^n$-Periodic Binary Sequences with Fixed
$k$-Error Linear Complexity. ISPEC2016 (12th International
Conference on Information Security Practice and Experience ,
Zhangjiajie, China, 16-18 November), LNCS 10060, pages
13-36, 2016.(CCF-C)
- Wenlun Pan, Zhenzhen Bao, Dongdai Lin and Feng Liu. The
Linear Complexity and $2$-error Linear Complexity
Distribution of $2^n$-Periodic Binary Sequences with Fixed
Hamming Weight . ICICS2016 (18th IEEE International
Conference on Information and Communications Security,
Singapore, 29 november-2 December), LNCS 9977, pages
107-123, 2016.(CCF-C)
- Teng Guo, Feng Liu and Wen Wang. Privacy monitor.
IWDW2016 (15th International Workshop on Digital-forensics
and Watermarking, Beijing, China 17-19 September),
LNCS 10082, pages 187-197, 2017.(CCF-C)
- Gang Shen, Feng Liu, Zhengxin Fu and Bin Yu. Halftone
Visual Cryptography with Complementary Cover Images.
IWDW2016 (15th International Workshop on Digital-forensics
and Watermarking, Beijing, China 17-19 September), LNCS
10082, pages 223-237, 2017.(CCF-C)
- Yawei Ren, Feng Liu and Wen Wang. Collusive Attacks to
Partition Authentication Visual Cryptography Scheme.
IWDW2016 (15th International Workshop on Digital-forensics
and Watermarking, Beijing, China 17-19 September), LNCS
10082, pages 238-250, 2017.(CCF-C)
- Wen Wang, Feng Liu, Teng Guo, Yawei Ren and Gang Shen.
Information Security Display Technology with Cheating
Effect. IWDW2016 (15th International Workshop on
Digital-forensics and Watermarking, Beijing, China 17-19
September), LNCS 10082, pages 198-208, 2017.(CCF-C)
- Jiaxin Yin, Rui Wang, Yuanfang Guo and Feng Liu. An
Adaptive Reversible Data Hiding Scheme for JPEG Images.
IWDW2016 (15th International Workshop on Digital-forensics
and Watermarking, Beijing, China 17-19 September), LNCS
10082, pages 456-469, 2017.(CCF-C)
- Weiqi Yan and Feng Liu, Event Analogy Based Privacy
Preservation in Visual Surveillance. International Workshop
on Video Surveillance of The 7th Pacific-Rim Symposium on
Image and Video Technology (PSIVT 2015), Auckland, New
Zealand 23-27 November), LNCS 9555, pages 357-368, 2016.
- Wen Wang, Feng Liu, Wei Qi Yan, Gang Shen and Teng Guo.
An Improved Aspect Ratio Invariant Visual Cryptography
Scheme with Flexible Pixel Expansion. IWDW2015 (14th
International Workshop on Digital-forensics and
Watermarking, Tokyo, Japan 7-10 October), LNCS 9569, pages
418-432, 2016.(CCF-C)
- Yawei Ren, Feng Liu, Dongdai Lin, Rongquan Feng and Wen
Wang. A New Construction of Tagged Visual Cryptography
Scheme . IWDW2015 (14th International Workshop on
Digital-forensics and Watermarking, Tokyo, Japan 7-10
October), LNCS 9569, pages 433-445, 2016.(CCF-C)
- Guangyu Wang, Feng Liu and Weiqi Yan. Braille For Visual
Cryptography. ISM2014 (IEEE International Symposium on
Multimedia, Taichung, Taiwan December 10-12, 2014). IEEE,
pages 175-276, 2014.
- Feng Liu and Chuankun Wu. Optimal XOR based (2,n)-Visual
Cryptography Schemes. Accepted by IWDW2014, full version of
the paper also available at ePrint Archive 2010/545, 2014.(slides)(CCF-C)
- Teng Guo, Feng Liu, Chuankun Wu, Young-Chang Hou, Yawei
Ren and Wen Wang, The Security Defect of a Multi-pixel
Encoding Method. ISC2013 (The 16th Information Security
Conference, Dallas, Texas, November 13-15, 2013), LNCS 7807,
pages39-48, 2015.(CCF-C)
- Teng Guo, Feng Liu and ChuanKun Wu, On (k, n) Visual
Cryptography Scheme with Several Essential Parties. ICITS
2013 (The 7th International Conference on Information
Theoretic Security, November 28-30, 2013, NTU, Singapore),
LNCS pages 56-68, 2014.
- Teng Guo, Feng Liu, Chuankun Wu and Ching-Nung Yang,
Threshold Secret Image Sharing. Accepted by ICICS 2013 (15th
International Conference on Information and Communications
Security, 20-22 November 2013, Beijing, China). LNCS
8233, pages 404-412, 2013. (CCF-C)
- Teng Guo, Feng Liu, Chuankun Wu, Yawei Ren and Wen Wang.
On the Randomness of Visual Cryptography Scheme. Processing
of IIH-MSP2013 IEEE, pp. 391-394 (The Ninth
International Conference on Intelligent Information Hiding
and Multimedia Signal Processing, October 16-18, 2013,
Beijing, China).
- Teng Guo, Feng Liu and Chuankun Wu. Visual Cryptography
for Natural Images and Visual Voting. Inscrypt2012
(The 8th China International Conference on Information
Security and Cryptology), Beijing, China, Nov. 28 - Dec. 1,
2012. LNCS 7763, pages 90-101, 2013.(CCF-C,CACR-B)
- Feng Liu, Weiqi Yan, Peng Li and Chuankun Wu. A Secret
Enriched Visual Cryptography Scheme. Accepted by IWDW 2012
(11th International Workshop on Digital-forensics and
Watermarking), Lecture Notes in Computer Science Volume
7809, 2013, pp 464-484, Shanghai China, 31 Oct.-3 Nov. 2012.
LNCS 7809, pages 464-484, 2013. (slides)(CCF-C)
- Teng Guo, Feng Liu and Chuankun Wu. On the Equivalence
of Two Definitions of Visual Cryptography Scheme. ISPEC
2012, pages 217-227, LNCS 7232, Hangzhou, China, April 9-12,
2012.(CCF-C)
- Feng Liu, Teng Guo, Chuankun Wu and Ching-Nung Yang.
Flexible Visual Cryptography Scheme Without Distortion.
IWDW2011 (10th International Workshop on Digital-forensics
and Watermarking), Lecture Notes in Computer Science, volume
7128/2012, pages 211-227, Atlantic City USA, 23-26 October
2011.(slides)(CCF-C)
- Teng Guo, Feng Liu and Chuankun Wu. Multi-pixel
Encryption Visual Cryptography. Inscrypt2011,Lecture Notes
in Computer Science 7537(2012), pp.86-92, Beijing China, 30
November - 3 December 2011.(CCF-C,CACR-B)
- Qinggang Yue, Rui Xue and Feng Liu. Some Improvements to
the Cost-Based Framework for Analyzing Denial of Service
Attack. INTRUST2011, LNCS 7222(2012), pages 84-101, Beijing
China, 27-29 November 2011.(CCF-C)
- Jianhua Peng, Feng Liu, Zhenju Zhao, Danqing Huang and
Rui Xue. Layered model checking of Kerberos protocol.
Accepted by CryptoForma'11, Limerick UK, on 21 June 2011.
- Zhenju Zhao, Feng Liu, Jianhua Peng, Danqing Huang, Rui
Xue and Zhenfeng Zhang. Some Improvements on Model Checking
CoreASM Specifications of Security Protocols. ISDPE 2010
(The 2nd International Symposium on Data, Privacy and
E-Commerce), pp. 66-71, Buffalo/Niagara Falls USA on Sept
13th-14th 2010. (AR=10%)
- Danqing Huang, Rui Xue, Feng Liu, Jianhua Peng, Zhenju
Zhao and Dongyao Ji. Formal Verification of HMQV Using
ASM-SPV. IIH-MSP 2010 (The Sixth International Conference on
Intelligent Information Hiding and Multimedia Signal
Processing), pp. 458-461, Darmstadt, Germany on October
15-17, 2010.
- Jianhua Peng, Feng Liu, Zhenju Zhao, Danqing Huang and
Rui Xue. ASM-SPV: A Model Checker for Security Protocols.
IIH-MSP 2010 (The Sixth International Conference on
Intelligent Information Hiding and Multimedia Signal
Processing), pp. 486-489, Darmstadt, Germany on October
15-17, 2010.
|
Articles and Essays
- Weixia Cai, Feng Liu,
Analysis and Thinking on the Construction of NSA Network Security Science Laboratory 美国国家安全局网络安全科学实验室建设的分析与思考,《中国信息安全》,2022.
- Yugang Jiang, Feng Liu, Wenlian Lu, Kun Sun, Lingyu Wang,
Shouhuai Xu, Moti Yung,
Where are
Cybersecurity Boundaries? Panel discussion of SciSec 2021.
- Bo Liu, Feng Liu, Gene Tsudik, Jia Xu, Jingguo Wang, Moti Yung,
Shouhuai Xu, Future Research Directions towards Science of Cyber Security.
Panel discussion of SciSec 2019.
- Lan Pi, Feng Liu, Dongdai Lin, A Preliminary Understanding of
the Privacy Protection In the Big Data Era. China Information
Security, volume 9, pages 90-93, 2015.
皮兰、刘峰、林东岱,大数据时代的隐私保护初探,《中国信息安全》,期9,页90-93,2015。
- Huashan Chen, Lan Pi, Feng Liu, Dongdai Lin "Research Frontier
and Trends of Science of Cybersecurity", volume 3, pages 1-5, 2015. 陈华山、皮兰、刘峰、林东岱,网络空间安全科学基础的研究前沿及发展趋势,《信息网络安全》,第3期,第1-5页,2015。
- Feng Liu and Miao Liu "Comments on the FICIC framework of
USA" China Information Security. To appear. 刘峰、刘淼,
美国《FICIC框架》及其影响力分析,《中国信息安全》,2014。
- Wenhao Wang, Feng Liu, Qian Zhao, From MH370 to the Protection
of Critical Infrastructure in China. China Information Security,
volume 6, pages 98-101, 2014.
王文浩、刘峰、赵倩,从MH370事件看我国关键基础设施保护,《中国信息安全》,期6,页98-101,2014。
- Qian Zhao, Feng Liu and Dongdai Lin. About the National
Initiative for Cybersecurity Education of the United States.
China Information Security, volume 8, pages 91-94, 2014. 赵倩、刘峰、林东岱,美国网络空间安全教育战略计划,《中国信息安全》,第8期,第91-94页, 2014。
- Dongdai Lin and Feng Liu. A Preliminary Understanding of the
United States Information Security System. Security Science and
Technology, volume 7, pages 6-13, 2012.
林东岱、刘峰,美国信息安全保密体系初探,《保密科学与技术》,卷7,页6-13,2012。
|
Talks Given to Public
- "Strategic Research of Cybersecurity", Chendu Library and
Information Center, Chengdu, China, Nov. 20, 2017.
- "Strategic Research of Cybersecurity", Guizhou Normal
University, Guiyang, China, Mar. 10, 2017.
- "Strategic Research of Cybersecurity", Seminar of Strategic
Research of Chinese Academy of Engineering, Haikou, China, Feb. 4,
2016.
- "Overview of the Cybersecurity System in USA", CN-CERT, Beijing
China, Jan. 12 2016.
- "Visual Security", Auckland University of Technolgoy,
Auckland, New Zealand, Nov. 2015.
- Audioslides for "Improving the visual quality of size invariant
visual cryptography scheme", for the Top 25 viewed papers in Journal
of Visual Communication and Image Representation, 2013.
- "A Brief Introduction of CAS & IIE & SKLOIS & VC", Auckland
University of Technology, Oct. 1 2013.
- "A Secret Enriched Visual Cryptography Scheme", IWDW 2012 (11th
International Workshop on Digital-forensics and Watermarking),
Shanghai China, 31 Oct.-3 Nov. 2012.
- "Flexible Visual Cryptography Scheme Without Distortion",
IWDW2011, Atlantic City USA, October 23-26, 2011.
- "On the progress of Visual Cryptography" (In Chinese), to appear
in CASC2010, Jinan China, August, 21-23, 2010.
- "Design and Realization of ASM-SPV for Analyzing Security
Protocols" (In Chinese), to appear in NASAC2010 or Journal of
Software, Suzhou China, November, 5-6, 2010.
- Some Improvements on Model Checking CoreASM Specifications of
Security Protocols, ISDPE 2010, Buffalo/Niagara Falls USA on Sept
13th-14th 2010.
- "Color Visual Cryptography Schemes." (In Chinese), 2nd
Conference on Computer Mathematics, Qingdao China, October, 24-26,
2008.
|
Teaching
- "Cybersecurity stragety research, School of Cybersecurity,
University of Chinese Academy of Sciences. 2022.2-2022.5.
- "Cybersecurity stragety research, School of Cybersecurity, University of Chinese Academy of Sciences. 2021.2-2021.5.
- "Cybersecurity stragety research, School of Cybersecurity, University of Chinese Academy of Sciences. 2020.2-2020.5.
- "Cybersecurity stragety research, School of Cybersecurity, University of Chinese Academy of Sciences. 2019.2-2019.5.
- "Cybersecurity stragety research, School of Cybersecurity, University of Chinese Academy of Sciences. 2018.2-2018.5.
- "Cybersecurity stragety research, School of Cybersecurity, University of Chinese Academy of Sciences. 2017.2-2017.5.
|
|

|
Patents
-
“A vulnerability load classification method and system based on code and semantic features” with No. CN119442229A. 一种基于代码和语义特征的漏洞负载分类方法及系统, 2025.
-
“Side channel feature completion and detection methods for encrypted traffic” with No. CN118631517A. 加密流量的侧信道特征补全方法和检测方法, 2024.
-
“Real-time network connection privacy protection method and system based on anti disturbance” with No. CN115174147B. 基于对抗扰动的实时网络连接隐私保护方法和系统, 2024.
-
“A method and device for lightweight malware traffic detection based on optimized meta learning” with No. CN115225310B. 基于优化元学习的轻量恶意软件流量检测方法及装置, 2024.
-
“A method and system for device access behavior detection based on traffic fingerprint distillation” with No. CN117857201A. 基于流量指纹蒸馏的设备入网行为检测方法和系统, 2024.
-
“A method and device for malware classification based on collaborative attention” with No. CN116186702B. 基于协同注意力的恶意软件分类方法和装置, 2024.
-
“A method and system for device access behavior detection based on traffic fingerprint distillation” with No. CN2024100787487. 基于流量指纹蒸馏的设备入网行为检测方法和系统, 2024.
-
“A real-time intrusion detection method and system based on explainable artificial intelligence” with No. CN116318787B. 一种基于可解释人工智能的实时入侵检测方法及系统, 2023.
-
“Vulnerability attack traffic detection method and system based on HTTP request payload” with No. CN114866279B. 基于HTTP请求有效负载的漏洞攻击流量检测方法和系统, 2023.
-
“A method and system for identifying and classifying encrypted traffic based on direct push graph” with No. CN114866301B. 基于直推图的加密流量识别与分类方法及系统, 2023.
-
“A real-time intrusion detection method and system based on explainable artificial intelligence” with No. CN202211571092.X. 一种基于可解释人工智能的实时入侵检测方法及系统, 2022.
-
“A method and device for lightweight malware traffic detection based on optimized meta learning” with No. CN115225310A. 基于优化元学习的轻量恶意软件流量检测方法及装置, 2022.
-
“Real-time network connection privacy protection method and system based on anti disturbance” with No. CN115174147A. 基于对抗扰动的实时网络连接隐私保护方法和系统, 2022.
-
“Classification method and system of encrypted traffic in different network environments based on graph matching” with No. CN114978593A. 基于图匹配的不同网络环境的加密流量分类方法及系统, 2022.
-
“A method and system for identifying and classifying encrypted traffic based on direct push graph” with No. CN114866301A. 基于直推图的加密流量识别与分类方法及系统, 2022.
-
“Vulnerability attack traffic detection method and system based on HTTP request payload” with No. CN114866279A. 基于HTTP请求有效负载的漏洞攻击流量检测方法和系统, 2022.
-
“Real-time network connection privacy protection method and system based on anti disturbance” with No. CN202210622904.2. 基于对抗扰动的实时网络连接隐私保护方法和系统, 2022.
-
“A method and system for identifying and classifying encrypted traffic based on direct push graph” with No. CN202210440703.0. 基于直推图的加密流量识别与分类方法及系统, 2022.
-
“Classification method and system of encrypted traffic in different network environments based on graph matching” with No. CN202210397693.7. 基于图匹配的不同网络环境的加密流量分类方法及系统, 2022.
-
“A 3D-2D synchronous display method and system” with No. CN113014902A. 3D-2D同步显示方法及系统, 2021.
-
“A method for secure display and the security display system with cheating prevention” with No. CN107680543A. 防偷窥的安全显示方法、具有欺伪效果的安全显示方法及安全显示系统, 2018.
-
“A method of constructing visual cryptography based privacy protecting display” with No. CN104269150A. 一种基于视觉密码的隐私保护显示器实现方法, 2015.
|
Software copyrights
- “ASM-SPV: Abstract State Machines based Security Protocol
Verifier”, with software copyright license No. 2010SRBJ1727, 2010.
- “SSPV: Symbolic Security Protocol Verifier”, with software
copyright license No. 2011SR013510, 2011.
|
|
|