|
|
Books & Chapters Monographs
- Feng Liu and Weiqi Yan. Visual Cryptography for Image Processing
and Security - Theory, Methods, and Applications . Springer-Verlag
London, 2014. (e-version,
and 2nd
Edition 2015)
- Feng Liu etc. Overview of the Cybersecurity System in USA.
Science Press, 2015. 刘峰等著,《美国网络空间安全体系》,科学出版社,2015。
Books Edited
- Chunhua Su, Kouichi Sakurai, Feng Liu. Proceedings of 4th
International Workshop on Science of Cybersecurity, SciSec2022,
Matsue, Japan, August 10–12, 2022.Lecture Notes in Computer Science (LNCS, volume 13580) (e-version)
- Wenlian Lu, Kun Sun, Moti Yung, Feng Liu. Proceedings of 3rd
International Workshop on Science of Cybersecurity, SciSec2021,
Shanghai, China, August 13-15, 2021.Lecture Notes in Computer Science (LNCS, volume 13005) (e-version)
- Feng Liu, Jia Xu, Shouhuai Xu, Moti Yung. Proceedings of 2st
International Workshop on Science of Cybersecurity, SciSec2019,
Nanjing, China, August 9-11, 2019. Lecture Notes in Computer Science (LNCS, volume 11933)(e-version)
- Feng Liu, Shouhuai Xu, Moti Yung. Proceedings of 1st
International Workshop on Science of Cybersecurity, SciSec2018,
Beijing, China, August 12-14, 2018. Lecture Notes in Computer Science (LNCS, volume 11287)(e-version)
- Shi, Y.Q., Kim, H.J., Perez-Gonzalez, F., Liu, F. Proceedings of
15th International Workshop on Digital Forensics and Watermarking, IWDW2016, Beijing, China, September
17-19, 2016. (e-version)
- Feng Liu and Weiqi Yan. Special Issue on Visual Cryptography of
Springer Transactions on Data Hiding and Multimedia Security. Contains
7 papers selected from 21 submissions, Springer LNCS 8363 , 2014. (e-version)
- Dongdai Lin, Feng Liu. Special Issue on cryptography of
Communications of the CCISA. Contains 4 review and progress
articles. To appear in 2015.
Chapters
- Feng Liu. Chapter 3: Cryptology and security protocol", in book
"Security Fundamentals of Internet of Things, pages 30-75. Science Press, 2013.刘峰,密码学与安全协议基础,《物联网安全基础》,页30-75,科学出版社,2013。
- Feng Liu. The optimization problem of visual cryptography
scheme. In book "10000 Selected Problems in Sciences Information
Sciences", Science Press, 2011.刘峰,视觉密码方案的最优化问题,《10000个科学难题?#20449;息科学卷》,科学出版社,2011。
- Feng Liu. Resolving the Alignment Problem in Visual
Cryptography. In book "Visual
Cryptography and Secret Image Sharing", pages 297-328, CRC press Taylor &
Francis LLC, ISBN: 9781439837214 , 2011.
- Feng Liu. On the progress of Visual Cryptography. In book
"Progress of Cryptography in China", pages 32-67, Publishing House
of Electronics Industry, 2010. 刘峰,视觉密码学研究进展,《中国密码学发展报告2010
》,页32-67,电子工业出版社,2010.
- Feng Liu. Visual Cryptography. To appear in Dictionary of
Mathematics, 2013. 刘峰,视觉密码学,《数学大词典》,2013.
|
|
Journal Papers
- Jiazhi Liu and Feng Liu "Modified 2D-Ghost-Free Stereoscopic
Display with Depth-of-Field Effects". Accepted by ACM Transactions
on Multimedia Computing Communications and Applications, 2022.
- Yaqin Zhang, Duohe Ma, Xiaoyan Sun, Chuan Zhou, Feng Liu "A Study on Deception-based Moving Target Defense", accepted by Journal of Cybersecurity(in Chinese),
2021. 张雅勤,马多贺,Xiaoyan Sun, 周川,刘峰,基于网络空间欺骗的移动目标防御技术研究,《信息安全学报》2021。
- Jia Kun, Wang Junnan, Liu Feng "DDoS detection and mitigation
Framework in SDN", accepted by Journal of Cybersecurity(in Chinese),
2020. 贾锟、 王君楠、刘峰, SDN环境下的DDoS检测与缓解机制,《信息安全学报》2020。
- Liyan Liu, Feng Liu, Yanyan Zou, Jianhua Zhou, Aihua Piao, Feng
Liu, Wei Huo "SiCsFuzzer: A Sparse-instrumentation-based Fuzzing
Platform for Closed Source Software", accepted by Journal of
Cybersecurity(in Chinese), 2020. 刘丽艳、李丰、邹燕燕、周建华、朴爱华、刘峰、霍玮,SiCsFuzzer:基于稀疏插桩的闭源软件模糊测试方法,《信息安全学报》2020。
- Dingyu Yan, Feng Liu, Yaqin Zhang, Kun Jia "Dynamical model for individual defence against cyber epidemic attacks ",
accepted by IET Information Security, 2019.
- Yawei Ren, Feng Liu, Weiqi Yan and Wen Wang. A New Visual
Evaluation Criterion of Visual Cryptography Scheme for Character
Secret Image. Multimedia Tools and Applications, volume 78 (18),
pages 25299–25319,2019.
- Tao Xu, Chuankun Wu, Feng Liu, Ruoxin Zhao "Protecting White-Box
Cryptographic Implementations with Obfuscated Round Boundaries",
SCIENCE CHINA Information Sciences, volume 61, issue 3, pages
237-239, 2018.
- Gang Shen, Feng Liu, Zhengxin Fu and Bin Yu
"Visual Cryptograms of Random Grids via Linear Algebra", Multimedia Tools and Applications,
volume 77, issue 10, pages 12871-12899, 2018.
- Tao Xu, Feng Liu and Chuankun Wu "A White-Box AES-Like
Implementation Based on Key-Dependent Substitution-Linear
Transformations", Multimedia Tools
and Applications, volume 77, pages 18117–18137, 2018.
- Xiaotian Wu, Weiqi Yan and Feng Liu, "Progressive Scrambling for
Social Media", International Journal of Digital Crime and Forensics,
volume 10, issue 2, pages 56–73,2018.
- Huashan Chen, Xiuyan Zhao, Feng Liu, Shouhuai Xu and Wenlian Lu "Optimizing
interconnections to maximize the spectral radius of interdependent
networks", Physical Review E, volume 95, 032308 , 2017.
- Teng Guo, Jian Jiao, Feng Liu and Wen Wang "On the Pixel
Expansion of Visual Cryptography Scheme" International Journal of
Digital Crime and Forensics, volume 9 issue 2, pages 38-44, , 2017.
- Gang Shen, Feng Liu, Zhengxin Fu and Bi-n Yu "Perfect
Contrast XOR-based Visual Cryptography Schemes via Linear Algebra",
Designs, Codes and Cryptography,
volume 85, issue 1, pages 15-37, 2017.
- Gang Shen, Feng Liu, Zhengxin Fu and Bin Yu "New insight into
linear algebraic technique to construct visual cryptography scheme
for general access structure",
Multimedia Tools and Applications ,
volume 54, pages 140-151, 2017.
- Yawei Ren, Feng Liu etc. "Cheating prevention visual
cryptography scheme using Latin square" IET Information Security,
volume 11 issue 4, page 211-219, 2017.
- Guangyu Wang, Feng Liu, Weiqi Yan "Basic Visual Cryptography
Using Braille" International Journal of Digital Crime and Forensics,
volume 8 issue 3, pages 85-93, , 2016.
- Guangyu Wang, Feng Liu, Weiqi Yan "2D Barcodes for Visual
Cryptography" Multimedia Tools and Applications,
volume 75, issue 2, pages 1223-1241, November, 2014. (DOI)
- Teng Guo, Feng Liu and Chuankun Wu. k out of k extended visual
cryptography scheme by random grids. Signal Processing (Elsevier),
volume 94, pages 90–101, January 2014.
- Feng Liu, Weiqi Yan, Peng Li and Chuankun Wu. ESSVCS: An
Enriched Secret Sharing Visual Cryptography. Springer Transactions on Data Hiding and Multimedia Security,
LNCS 8363, pages 1-24, 2014.
- Feng Liu, Teng Guo, Chuankun Wu and Ching-Nung Yang. Flexible
Visual Cryptography Scheme Without Distortion and Its Application.
Springer Transactions on Data Hiding and Multimedia
Security, LNCS 8363, pages 110-130, 2014.
- Teng Guo, Feng Liu and Chuankun Wu. Threshold visual secret
sharing by random grids with improved contrast. Journal
of Systems and Software, volume 86, issue 8, pages 2094–2109, 2013.
- Feng Liu, Teng Guo and Chuankun Wu and Lina Qian. Improving the Visual Quality of Size Invariant Visual Cryptography Scheme. Journal of Visual Communication and Image Representation,
volume 23, pages 331-342, 2012.
- Feng Liu and Chuankun Wu. Embedded Extended Visual Cryptography
Schemes. IEEE Transactions on Information Forensics & Security,
volume 6, No. 2, pages 307-322, 2011, also available at ePrint Archive 2010/439.
- Feng Liu, Chuankun Wu and Xijun Lin. Cheating Immune Visual
Cryptography Scheme. IET Information Security, volume 5, issue 1,
pages 51-59, 2011.
- Ching-Nung Yang, Chih-Cheng Wu and Feng Liu. Construction of General (k, n) Probabilistic Visual Cryptography Schemes. Journal of Electronic Science and Technology,
volume 9, No. 4, pages 317-324, 2011.
- Peng Li, Peijun Ma and Feng Liu. Multi-Threshold Image Secret
Sharing Scheme. Journal of Electronics, volume 40, issue 3, pages
518-524, 2012. 李鹏、马培军、刘峰,多重门限的图像秘密共享方案,《电子学报》,卷40,期3,页518-524,2012。
- Junqing Liang, XiJun Lin and Feng Liu. CLPKE: Against A
Variation of Key Replacement Attack without Bilinear Pairing. JCIT:
Journal of Convergence Information Technology, volume 7, No. 3, pages 137-145, 2012.
- Feng Liu, Chuankun Wu and Xijun Lin. Step Construction of Visual
Cryptography Schemes. IEEE Transactions on Information Forensics &
Security, volume 5, No. 1, pages 27-38, 2010.
- Feng Liu, Chuankun Wu and Xijun Lin. A New Definition of the
Contrast of Visual Cryptography Scheme. Information Processing
Letters, volume 110, pages 241-246, 2010.
- Feng Liu, Chuankun Wu and Xijun Lin. Some Extensions on Threshold
Visual Cryptography Schemes. The Computer Journal, volume 53, issue
1, pages 107-119, 2010.
- Feng Liu and Chuankun Wu. A Robust Visual Cryptography Based
Watermarking Scheme for Multiple Cover Images and Multiple Owners. IET Information Security,
volume 5, issue 2, pages 121–128, 2010.
- Feng Liu, Chuankun Wu and Xijun Lin. The Alignment Problem of the
Visual Cryptography Scheme. Designs, codes and cryptography, volume
50, issue 2, pages 215-227, 2009.
- Xijun Lin, Chuankun Wu and Feng Liu. Many-to-one Encryption and
Authentication Scheme and Its Application" Journal of Communications
and Networks Volume 10, No. 1, pages 18-27, 2008.
- Xijun Lin, Chuankun Wu and Feng Liu. Analysis of An
Authenticated Identity-based Multicast Scheme. IET Proceedings-Communications
Volume 2, issue 7, pages 935-937, 2008.
- Feng Liu, Chuankun Wu and Xijun Lin. Colour Visual Cryptography
Schemes. IET Information Security Volume 2, issue 4, pages 151-165,
2008.
- Feng Liu, Peng Li and Chuankun Wu. Encrypting More Information in
Visual Cryptography Scheme. available at ePrint Archive 2011/340, 2011.
An updated version of the paper has been accepted to be published in
IWDW2012.
|
Conference Papers
- Huaifeng Bao, Li Wenhao, Xingyu Wang, Zixian Tang, Qiang Wang, Wen Wang and Feng Liu "
Payload Level Graph Attention Network for Web Attack Traffic Detection". Accepted by ICCS 2023.
- Yuantian Zhang, Feng Liu and Huashan Chen "Optimal Strategy
Selection for Cyber Deception via Deep Reinforcement Learning"
Accepted by IEEE UIC 2022 (The 2022 IEEE International Conference on
Ubiquitous Intelligence and Computing, 15-18 December, Haikou China), 2022.
- Qiang Wang, Wenhao Li, Huaifeng Bao, Zixian Tang, Wen Wang, Feng
Liu and Lingyun Ying "High-Efficient and Few-Shot Adaptive Encrypted
Traffic Classification With Deep Tree" Accepted by MILCOM 2022.
- Kun Jia, Jiazhi Liu, Wen Wang and Feng Liu. “Hybrid Routing for
Efficient Fine-Grained Management of Specific Services in SDN”.
Accepted by SciSec 2022 (The 4th International Conference on Science
of Cyber Security, 10-12 August, Matsue city, Shimane, Japan),
2022.
- Jiazhi Liu and Feng Liu "Robust Stereo Matching with an Unfixed
and Adaptive Disparity Search Range". Accepted by ICPR 2022 (26TH
International Conference on Pattern Recognition August 21-25,
Montréal Québec), 2022.
- Jiazhi Liu and
Feng Liu "A novel stereo matching pipeline with robustness and
unfixed disparity search range ". Accepted by ICME 2022 (IEEE
International Conference on Multimedia and Expo 2022 , 11-15 July,
Taipei, China ),
2022.
- Zixian Tang, Qiang Wang, Wenhao Li, Huaifeng Bao, Wen Wang and
Feng Liu "Mining Trojan Detection Based on Multi-dimensional Static
Features". Accepted by SciSec 2021 (The 3rd International Conference
on Science of Cyber Security, 13-15 August, Shanghai, China ),
2021.
- Zixian Tang, Qiang Wang, Wenhao Li, Huaifeng Bao, Wen Wang
and Feng Liu "HSLF: HTTP Header Sequence based LSH fingerprints for
Application Traffic Classification". Accepted by ICCS 2021
(International Conference on Computational Science, 16-18 June,
Krakow, Poland), 2021.
- Yaqin Zhang, Duohe Ma, Xiaoyan Sun, Kai Chen, Feng Liu "What You
See Is Not What You Get: Towards Deception-Based Data Moving Target
Defense". Accepted by IEEE IPCCC 2020(39th IEEE -- International
Performance Computing and Communications Conference, 6- 8 November,
Virtual Conference), 2020.
- Yaqin Zhang, Duohe Ma, Xiaoyan Sun, Kai Chen, Feng Liu "WGT:
Thwarting Web Attacks Through Web Gene Tree-based Moving Target
Defense". Accepted by ICWS 2020 (IEEE International Conference on
Web Services, October 19-23, Beijing, China), 2020.
- Dingyu Yan, Feng Liu. A Heuristic Method for Network
Modification against Cyber Epidemic Attacks. Accepted by
TrustCom2019 (18th IEEE International Conference on Trust, Security
and Privacy in Computing and Communications, Rotorua, New Zealand
from 5 - 8 August), 2019.
- Dingyu Yan, Feng Liu, Kun Jia. Modeling an Information-based
Advanced Persistent Threat Attack on the Internal Network. Accepted by
ICC2019 (IEEE International Conference on Communications, Shanghai,
China, 20-24 May), 2019.
- Dingyu Yan, Feng Liu, Yaqin Zhang, Kun Jia, and Yuantian Zhang.
Characterizing the Optimal Attack Strategy Decision in Cyber
Epidemic Attacks with Limited Resources. Accepted by SciSec2018 (1st
International Conference on Science of Cyber Security, Beijing,
China, 12-14 August), 2018.
- Wen Wang, Feng Liu, Teng Guo and Yawei Ren. Temporal Integration
Based Visual Cryptography Scheme and Its Application. IWDW2017 (16th International Workshop on Digital-forensics and
Watermarking, Magdeburg, Germany 23-25 August), LNCS 10431, pages
406-419, 2017.
- Wenlun Pan, Zhenzhen Bao, Dongdai Lin and Feng Liu. The
Distribution of $2^n$-Periodic Binary Sequences with Fixed $k$-Error
Linear Complexity. ISPEC2016 (12th International
Conference on Information Security Practice and Experience ,
Zhangjiajie, China, 16-18 November), LNCS 10060, pages 13-36, 2016.
- Wenlun Pan, Zhenzhen Bao, Dongdai Lin and Feng Liu. The Linear
Complexity and $2$-error Linear Complexity Distribution of
$2^n$-Periodic Binary Sequences with Fixed Hamming Weight .
ICICS2016 (18th IEEE International Conference on Information and
Communications Security, Singapore, 29 november-2 December), LNCS
9977, pages 107-123, 2016.
- Teng Guo, Feng Liu and Wen Wang. Privacy monitor. IWDW2016 (15th International Workshop on Digital-forensics and
Watermarking, Beijing, China 17-19 September), LNCS 10082,
pages 187-197, 2017.
- Gang Shen, Feng Liu, Zhengxin Fu and Bin Yu. Halftone Visual
Cryptography with Complementary Cover Images. IWDW2016
(15th International Workshop on Digital-forensics and Watermarking,
Beijing, China 17-19 September), LNCS 10082, pages 223-237, 2017.
- Yawei Ren, Feng Liu and Wen Wang. Collusive Attacks to Partition
Authentication Visual Cryptography Scheme. IWDW2016
(15th International Workshop on Digital-forensics and Watermarking,
Beijing, China 17-19 September), LNCS 10082, pages 238-250, 2017.
- Wen Wang, Feng Liu, Teng Guo, Yawei Ren and Gang Shen.
Information Security Display Technology with Cheating Effect.
IWDW2016 (15th International Workshop on
Digital-forensics and Watermarking, Beijing, China 17-19 September),
LNCS 10082, pages 198-208, 2017.
- Jiaxin Yin, Rui Wang, Yuanfang Guo and Feng Liu. An Adaptive
Reversible Data Hiding Scheme for JPEG Images. IWDW2016
(15th International Workshop on Digital-forensics and Watermarking,
Beijing, China 17-19 September), LNCS 10082, pages 456-469, 2017.
- Weiqi Yan and Feng Liu, Event Analogy Based Privacy Preservation
in Visual Surveillance. International Workshop on Video
Surveillance of The 7th Pacific-Rim Symposium on Image and Video
Technology (PSIVT 2015), Auckland, New Zealand 23-27
November), LNCS 9555, pages 357-368, 2016.
- Wen Wang, Feng Liu, Wei Qi Yan, Gang Shen and Teng Guo. An
Improved Aspect Ratio Invariant Visual Cryptography Scheme with
Flexible Pixel Expansion. IWDW2015 (14th International
Workshop on Digital-forensics and Watermarking, Tokyo, Japan 7-10
October), LNCS 9569, pages 418-432, 2016.
- Yawei Ren, Feng Liu, Dongdai Lin, Rongquan Feng and Wen Wang. A
New Construction of Tagged Visual Cryptography Scheme .
IWDW2015 (14th International Workshop on
Digital-forensics and Watermarking, Tokyo, Japan 7-10 October),
LNCS 9569, pages 433-445, 2016.
- Guangyu Wang, Feng Liu and Weiqi Yan. Braille For Visual
Cryptography. ISM2014 (IEEE International Symposium on
Multimedia, Taichung, Taiwan December 10-12, 2014). IEEE, pages
175-276, 2014.
- Feng Liu and Chuankun Wu. Optimal XOR based (2,n)-Visual
Cryptography Schemes. Accepted by IWDW2014, full version of the
paper also available at ePrint Archive 2010/545, 2014.(slides)
- Teng Guo, Feng Liu, Chuankun Wu, Young-Chang Hou, Yawei Ren and
Wen Wang, The Security Defect of a Multi-pixel Encoding Method.
ISC2013 (The 16th Information Security Conference,
Dallas, Texas, November 13-15, 2013), LNCS 7807, pages39-48, 2015.
- Teng Guo, Feng Liu and ChuanKun Wu, On (k, n) Visual
Cryptography Scheme with Several Essential Parties. ICITS 2013 (The
7th International Conference on Information Theoretic Security,
November 28-30, 2013, NTU, Singapore), LNCS pages 56-68, 2014.
- Teng Guo, Feng Liu, Chuankun Wu and Ching-Nung Yang, Threshold
Secret Image Sharing. Accepted by ICICS 2013 (15th International
Conference on Information and Communications Security, 20-22
November 2013, Beijing, China). LNCS 8233, pages 404-412, 2013.
- Teng Guo, Feng Liu, Chuankun Wu, Yawei Ren and Wen Wang. On the
Randomness of Visual Cryptography Scheme. Processing of IIH-MSP2013
IEEE, pp. 391-394
(The Ninth International Conference on
Intelligent Information Hiding and Multimedia Signal Processing, October 16-18, 2013, Beijing, China).
- Teng Guo, Feng Liu and Chuankun Wu. Visual Cryptography for
Natural Images and Visual Voting. Inscrypt2012
(The 8th China International Conference on Information Security and
Cryptology), Beijing, China, Nov. 28 - Dec. 1, 2012. LNCS 7763,
pages 90-101, 2013.
- Feng Liu, Weiqi Yan, Peng Li and Chuankun Wu. A Secret Enriched
Visual Cryptography Scheme. Accepted by IWDW 2012 (11th
International Workshop on Digital-forensics and Watermarking),
Lecture Notes in Computer Science Volume 7809, 2013, pp 464-484,
Shanghai China, 31 Oct.-3 Nov. 2012. LNCS 7809, pages 464-484, 2013. (slides)
- Teng Guo, Feng Liu and Chuankun Wu. On the Equivalence of Two
Definitions of Visual Cryptography Scheme. ISPEC 2012, pages 217-227, LNCS 7232,
Hangzhou, China, April 9-12, 2012.
- Feng Liu, Teng Guo, Chuankun Wu and Ching-Nung Yang. Flexible Visual Cryptography Scheme Without Distortion. IWDW2011 (10th International Workshop on Digital-forensics and Watermarking), Lecture Notes in Computer Science,
volume 7128/2012, pages 211-227, Atlantic City USA, 23-26 October 2011.(slides)
- Teng Guo, Feng Liu and Chuankun Wu. Multi-pixel Encryption Visual Cryptography. Inscrypt2011,Lecture
Notes in Computer Science 7537(2012), pp.86-92, Beijing China, 30 November - 3 December 2011.
- Qinggang Yue, Rui Xue and Feng Liu. Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attack. INTRUST2011, LNCS 7222(2012),
pages 84-101, Beijing China, 27-29 November 2011.
- Jianhua Peng, Feng Liu, Zhenju Zhao, Danqing Huang and Rui Xue. Layered model checking of Kerberos protocol. Accepted by
CryptoForma'11, Limerick UK, on 21 June 2011.
- Zhenju Zhao, Feng Liu, Jianhua Peng, Danqing Huang, Rui Xue and
Zhenfeng Zhang. Some Improvements on Model Checking CoreASM
Specifications of Security Protocols. ISDPE 2010 (The 2nd
International Symposium on Data, Privacy and E-Commerce), pp. 66-71,
Buffalo/Niagara Falls USA on Sept 13th-14th 2010. (AR=10%)
- Danqing Huang, Rui Xue, Feng Liu, Jianhua Peng, Zhenju Zhao and
Dongyao Ji. Formal Verification of HMQV Using ASM-SPV. IIH-MSP 2010 (The Sixth International Conference on Intelligent
Information Hiding and Multimedia Signal Processing), pp. 458-461,
Darmstadt, Germany on October 15-17, 2010.
- Jianhua Peng, Feng Liu, Zhenju Zhao, Danqing Huang and Rui Xue. ASM-SPV:
A Model Checker for Security Protocols. IIH-MSP 2010
(The Sixth International Conference on Intelligent Information
Hiding and Multimedia Signal Processing), pp. 486-489, Darmstadt,
Germany on October 15-17, 2010.
|
Articles and Essays
- Weixia Cai, Feng Liu,
Analysis and Thinking on the Construction of NSA Network Security Science Laboratory 美国国家安全局网络安全科学实验室建设的分析与思考,《中国信息安全》,2022.
- Yugang Jiang, Feng Liu, Wenlian Lu, Kun Sun, Lingyu Wang,
Shouhuai Xu, Moti Yung,
Where are
Cybersecurity Boundaries? Panel discussion of SciSec 2021.
- Bo Liu, Feng Liu, Gene Tsudik, Jia Xu, Jingguo Wang, Moti Yung,
Shouhuai Xu, Future Research Directions towards Science of Cyber Security.
Panel discussion of SciSec 2019.
- Lan Pi, Feng Liu, Dongdai Lin, A Preliminary Understanding of
the Privacy Protection In the Big Data Era. China Information
Security, volume 9, pages 90-93, 2015.
皮兰、刘峰、林东岱,大数据时代的隐私保护初探,《中国信息安全》,期9,页90-93,2015。
- Huashan Chen, Lan Pi, Feng Liu, Dongdai Lin "Research Frontier
and Trends of Science of Cybersecurity", volume 3, pages 1-5, 2015. 陈华山、皮兰、刘峰、林东岱,网络空间安全科学基础的研究前沿及发展趋势,《信息网络安全》,第3期,第1-5页,2015。
- Feng Liu and Miao Liu "Comments on the FICIC framework of
USA" China Information Security. To appear. 刘峰、刘淼,
美国《FICIC框架》及其影响力分析,《中国信息安全》,2014。
- Wenhao Wang, Feng Liu, Qian Zhao, From MH370 to the Protection
of Critical Infrastructure in China. China Information Security,
volume 6, pages 98-101, 2014.
王文浩、刘峰、赵倩,从MH370事件看我国关键基础设施保护,《中国信息安全》,期6,页98-101,2014。
- Qian Zhao, Feng Liu and Dongdai Lin. About the National
Initiative for Cybersecurity Education of the United States.
China Information Security, volume 8, pages 91-94, 2014. 赵倩、刘峰、林东岱,美国网络空间安全教育战略计划,《中国信息安全》,第8期,第91-94页, 2014。
- Dongdai Lin and Feng Liu. A Preliminary Understanding of the
United States Information Security System. Security Science and
Technology, volume 7, pages 6-13, 2012.
林东岱、刘峰,美国信息安全保密体系初探,《保密科学与技术》,卷7,页6-13,2012。
|
Talks Given to Public
- "Strategic Research of Cybersecurity", Chendu Library and
Information Center, Chengdu, China, Nov. 20, 2017.
- "Strategic Research of Cybersecurity", Guizhou Normal
University, Guiyang, China, Mar. 10, 2017.
- "Strategic Research of Cybersecurity", Seminar of Strategic
Research of Chinese Academy of Engineering, Haikou, China, Feb. 4,
2016.
- "Overview of the Cybersecurity System in USA", CN-CERT, Beijing
China, Jan. 12 2016.
- "Visual Security", Auckland University of Technolgoy,
Auckland, New Zealand, Nov. 2015.
- Audioslides for "Improving the visual quality of size invariant
visual cryptography scheme", for the Top 25 viewed papers in Journal
of Visual Communication and Image Representation, 2013.
- "A Brief Introduction of CAS & IIE & SKLOIS & VC", Auckland
University of Technology, Oct. 1 2013.
- "A Secret Enriched Visual Cryptography Scheme", IWDW 2012 (11th
International Workshop on Digital-forensics and Watermarking),
Shanghai China, 31 Oct.-3 Nov. 2012.
- "Flexible Visual Cryptography Scheme Without Distortion",
IWDW2011, Atlantic City USA, October 23-26, 2011.
- "On the progress of Visual Cryptography" (In Chinese), to appear
in CASC2010, Jinan China, August, 21-23, 2010.
- "Design and Realization of ASM-SPV for Analyzing Security
Protocols" (In Chinese), to appear in NASAC2010 or Journal of
Software, Suzhou China, November, 5-6, 2010.
- Some Improvements on Model Checking CoreASM Specifications of
Security Protocols, ISDPE 2010, Buffalo/Niagara Falls USA on Sept
13th-14th 2010.
- "Color Visual Cryptography Schemes." (In Chinese), 2nd
Conference on Computer Mathematics, Qingdao China, October, 24-26,
2008.
|
Teaching
- "Cybersecurity stragety research, School of Cybersecurity,
University of Chinese Academy of Sciences. 2022.2-2022.5.
- "Cybersecurity stragety research, School of Cybersecurity, University of Chinese Academy of Sciences. 2021.2-2021.5.
- "Cybersecurity stragety research, School of Cybersecurity, University of Chinese Academy of Sciences. 2020.2-2020.5.
- "Cybersecurity stragety research, School of Cybersecurity, University of Chinese Academy of Sciences. 2019.2-2019.5.
- "Cybersecurity stragety research, School of Cybersecurity, University of Chinese Academy of Sciences. 2018.2-2018.5.
- "Cybersecurity stragety research, School of Cybersecurity, University of Chinese Academy of Sciences. 2017.2-2017.5.
|
|
Patents
-
“Real-time network connection privacy protection method and system based on anti disturbance” with application No.
202210622904.2. 基于对抗扰动的实时网络连接隐私保护方法和系统, 2022.
-
“A method and device for lightweight malware traffic detection based on optimized meta learning” with application No.
202210547678.6. 基于优化元学习的轻量恶意软件流量检测方法及装置, 2022.
-
“A Method and System for Identifying and Classifying Encrypted Traffic Based on Direct Push Graph” with application No.
202210440703.0. 基于直推图的加密流量识别与分类方法及系统, 2022.
-
“Classification method and system of encrypted traffic in different
network environments based on graph matching” with application No.
202210397693.7. 基于图匹配的不同网络环境的加密流量分类方法及系统, 2022.
-
"A 2D-3D synchronous display method and system"
with No. 202110172879.8. 2D-3D同步显示方法及系统, 2021.
-
“A method for secure display and the security display system with
cheating prevention ” with Application No.2017107899619.
防偷窥的安全显示方法、具有欺伪效果的安全显示方法及安全显示系统 , 2017.
-
“A method of constructing of visual cryptography based privacy
protecting display” with No.201410542752.0 .
一种基于视觉密码的隐私保护显示器实现方法, 2014.
- “A visual cryptography based visual anti-copying technique”,
with No. 201210075522.9, 2012. 一种基于视觉密码的可视防复印技术,专利号201210075522.9,
2012.
- “A method of formal analyzing security protocols”, with No.
201010578947.2, 2010. 一种安全协议的形式化分析方法,专利号 201010578947.2, 2010.
|
Software copyrights
- “ASM-SPV: Abstract State Machines based Security Protocol
Verifier”, with software copyright license No. 2010SRBJ1727, 2010.
- “SSPV: Symbolic Security Protocol Verifier”, with software
copyright license No. 2011SR013510, 2011.
|
|
|