
Qixu Liu
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c28]Jie Yin, Xiang Cui, Chaoge Liu, Qixu Liu, Tao Cui, Zhi Wang:
CoinBot: A Covert Botnet in the Cryptocurrency Network. ICICS 2020: 107-125 - [i1]Zhi Wang, Chaoge Liu, Xiang Cui, Jialong Zhang, Di Wu, Jie Yin, Jiaxi Liu, Qixu Liu, Jinli Zhang:
AI-powered Covert Botnet Command and Control on OSNs. CoRR abs/2009.07707 (2020)
2010 – 2019
- 2019
- [c27]Zhiqiang Wang, Quanqi Li, Yazhe Wang, Biao Liu, Jianyi Zhang, Qixu Liu:
Medical Protocol Security: DICOM Vulnerability Mining Based on Fuzzing Technology. CCS 2019: 2549-2551 - [c26]Zhiqiang Wang, Quanqi Li, Qian Liu, Biao Liu, Jianyi Zhang, Tao Yang, Qixu Liu:
DICOM-Fuzzer: Research on DICOM Vulnerability Mining Based on Fuzzing Technology. ChinaCom (1) 2019: 509-524 - [c25]Zhiqiang Wang, Gefei Li, Yaping Chi, Jianyi Zhang, Qixu Liu, Tao Yang, Wei Zhou:
Honeynet Construction Based on Intrusion Detection. CSAE 2019: 80:1-80:5 - [c24]Zhiqiang Wang, Gefei Li, Yaping Chi, Jianyi Zhang, Tao Yang, Qixu Liu:
Android Malware Detection Based on Convolutional Neural Networks. CSAE 2019: 151:1-151:6 - [c23]Zhiqiang Wang, Hongyu Dong, Yaping Chi, Jianyi Zhang, Tao Yang, Qixu Liu:
DGA and DNS Covert Channel Detection System based on Machine Learning. CSAE 2019: 156:1-156:5 - [c22]Pingchuan Ma
, Zhiqiang Wang, Xiali Hei, Xiaoxiang Zou, Jianyi Zhang, Qixu Liu, Xin Lyu, Zihan Zhuo:
A Quantitative Approach for Medical Imaging Device Security Assessment. DSN (Supplements) 2019: 5-6 - [c21]Di Wu, Binxing Fang, Junnan Wang, Qixu Liu, Xiang Cui:
Evading Machine Learning Botnet Detection Models via Deep Reinforcement Learning. ICC 2019: 1-6 - [c20]Zihao Zhao, Qixu Liu, Tiantian Song, Zhi Wang, Xianda Wu:
WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning. ICICS 2019: 725-745 - 2018
- [j12]Ying Dong, Yuqing Zhang, Hua Ma, Qianru Wu, Qixu Liu, Kai Wang, Wenjie Wang:
An adaptive system for detecting malicious queries in web attacks. Sci. China Inf. Sci. 61(3): 032114:1-032114:16 (2018) - [c19]Zhaopeng Jia, Xiang Cui, Qixu Liu, Xiaoxi Wang, Chaoge Liu:
Micro-Honeypot: Using Browser Fingerprinting to Track Attackers. DSC 2018: 197-204 - [c18]Zihan Wang, Xu Wu, Chaoge Liu, Qixu Liu, Jialai Zhang:
RansomTracer: Exploiting Cyber Deception for Ransomware Tracing. DSC 2018: 227-234 - [c17]Jingqiang Liu, Zihao Zhao, Xiang Cui, Zhi Wang
, Qixu Liu:
A Novel Approach for Detecting Browser-Based Silent Miner. DSC 2018: 490-497 - [c16]Zhi Wang, Jinli Zhang, Qixu Liu, Xiang Cui, Junwei Su:
Practical Metrics for Evaluating Anonymous Networks. SciSec 2018: 3-18 - [c15]Kaili Qiu, Qixu Liu, Jingqiang Liu, Lei Yu, Yiwen Wang:
An Empirical Study of OAuth-Based SSO System on Web. WASA 2018: 400-411 - 2017
- [j11]Zhejun Fang, Qixu Liu, Yuqing Zhang, Kai Wang, Zhiqiang Wang, Qianru Wu:
A static technique for detecting input validation vulnerabilities in Android apps. Sci. China Inf. Sci. 60(5): 052111:1-052111:16 (2017) - [j10]Hongzhou Yue, Yuqing Zhang, Wenjie Wang, Qixu Liu:
Driving Android apps to trigger target API invocations based on activity and GUI filtering. Sci. China Inf. Sci. 60(7): 78102 (2017) - 2016
- [c14]Xiaofeng Liu, Qixu Liu, Xiaoxi Wang, Zhaopeng Jia:
Fingerprinting Web Browser for Tracing Anonymous Web Attackers. DSC 2016: 222-229 - [c13]Qianru Wu, Qixu Liu, Yuqing Zhang, Peng Liu, Guanxing Wen:
A Machine Learning Approach for Detecting Third-Party Trackers on the Web. ESORICS (1) 2016: 238-258 - 2015
- [j9]Yuqing Zhang, Qixu Liu, Qihan Luo, Xiali Wang:
XAS: Cross-API scripting attacks in social ecosystems. Sci. China Inf. Sci. 58(1): 1-14 (2015) - [j8]Qianru Wu, Qixu Liu, Yuqing Zhang, Guanxing Wen:
TrackerDetector: A system to detect third-party trackers through machine learning. Comput. Networks 91: 164-173 (2015) - [c12]Kai Wang, Yuqing Zhang, Qixu Liu, Dan Fan:
A fuzzing test for dynamic vulnerability detection on Android Binder mechanism. CNS 2015: 709-710 - [c11]Zhejun Fang, Qixu Liu, Yuqing Zhang, Kai Wang, Zhiqiang Wang:
IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component Communication. ISPEC 2015: 378-392 - 2014
- [j7]Zhejun Fang, Yuqing Zhang, Ying Kong, Qixu Liu:
Static detection of logic vulnerabilities in Java web applications. Secur. Commun. Networks 7(3): 519-531 (2014) - [c10]Qixu Liu, Qianru Wu, Yuqing Zhang, Xiali Wang:
POSTER: Recommendation-based Third-Party Tracking Monitor to Balance Privacy with Personalization. CCS 2014: 1472-1474 - [c9]Chen Cao, Yuqing Zhang, Qixu Liu, Kai Wang:
Function Escalation Attack. SecureComm (1) 2014: 481-497 - 2013
- [j6]Zhiqiang Wang, Yuqing Zhang, Qixu Liu:
RPFuzzer: A Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing. KSII Trans. Internet Inf. Syst. 7(8): 1989-2009 (2013) - [j5]Huan Yang, Yuqing Zhang, Yu-pu Hu, Qixu Liu:
IKE vulnerability discovery based on fuzzing. Secur. Commun. Networks 6(7): 889-901 (2013) - [c8]Guanxing Wen, Yuqing Zhang, Qixu Liu, Dingning Yang:
Fuzzing the ActionScript virtual machine. AsiaCCS 2013: 457-468 - [c7]Qixu Liu, Yuqing Zhang, Huan Yang:
trend of online flash XSS vulnerabilities. CCS 2013: 1421-1424 - 2012
- [j4]Shenlong Chen, Yuqing Zhang, Qixu Liu, Jingyu Feng:
Dealing with dishonest recommendation: The trials in reputation management court. Ad Hoc Networks 10(8): 1603-1618 (2012) - [j3]Qixu Liu, Yuqing Zhang, Ying Kong, Qianru Wu:
Improving VRSS-based vulnerability prioritization using analytic hierarchy process. J. Syst. Softw. 85(8): 1699-1708 (2012) - [c6]Zhiqiang Wang, Yuqing Zhang, Qixu Liu:
A research on vulnerability discovering for router protocols based on fuzzing. CHINACOM 2012: 245-250 - [c5]Dingning Yang, Yuqing Zhang, Qixu Liu:
BlendFuzz: A Model-Based Framework for Fuzz Testing Programs with Grammatical Inputs. TrustCom 2012: 1070-1076 - [c4]Ying Kong, Yuqing Zhang, Zhejun Fang, Qixu Liu:
Static Detection of Logic Vulnerabilities in Java Web Applications. TrustCom 2012: 1083-1088 - 2011
- [j2]Qixu Liu, Yuqing Zhang:
VRSS: A new system for rating and scoring vulnerabilities. Comput. Commun. 34(3): 264-273 (2011) - [c3]Tongtong Chen
, Bin Dai, Daxue Liu, Bo Zhang, Qixu Liu:
3D LIDAR-based ground segmentation. ACPR 2011: 446-450 - [c2]Tingbo Hu, Tao Wu, Jinze Song, Qixu Liu, Bo Zhang:
A New Tree Structure for Weighted Dynamic Programming Based Stereo Algorithm. ICIG 2011: 100-105 - 2010
- [c1]Ying Kong, Yuqing Zhang, Qixu Liu:
Eliminating Human Specification in Static Analysis. RAID 2010: 494-495
2000 – 2009
- 2008
- [j1]Qixu Liu, Yuqing Zhang:
TFTP vulnerability finding technique based on fuzzing. Comput. Commun. 31(14): 3420-3426 (2008)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-12-01 23:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint