avatar

Xin (Bird) Liu

SEC Researcher @ LZU

Recent Featured Publications

I am working on various security topics, and this pape lists my recent work. All items in Hacker Talks are briefings or talks on top hacker conferences. All items in Research Papers are publications on academic journals or conferences.

Hacker Talks

  • [HITBASIA’24] Yes, I Am Human: Breaking Fake Voice Detection with Speaker-Irrelative Features
    Xuan Hai#, Xin Liu#*, Yuan Tan, Song Li, Qingguo Zhou*
    Hack In The Box Security Conference 2024 - Asia: CommSec Track

  • [BHUSA’22] Human or Not: Can You Really Detect the Fake Voices?
    Xin Liu, Yuan Tan, Rui Chong, Xiaokang Zhou, Mingyuan Zhang, Qingguo Zhou*
    Black Hat USA 2022: AI, ML, & Data Science

  • [BHASIA’21] Disappeared Coins: Steal Hashrate in Stratum Secretly
    Xin Liu, Rui Chong, Yuanyuan Huang, Yingli Zhang, Qingguo Zhou*
    Black Hat Asia 2021: Applied Security

  • [PROPHET’18] A Novel Romote Code Injection Attack in Solidity
    Rui Chong*, Xin Liu
    Aliyun Prophet WhiteHat Conference 2018: Oral Presentation

Research Papers

Open-Source Supplychain Management

  • [ISSRE’24] LiScopeLens: An Open-Source License Incompatibility Analysis Tool Based on Scope Representation of License Terms [Best Paper Runner-Up Award]
    Ziang Liu#, Xin Liu#*, Yingli Zhang, Zihao Zhang, Song Li, Weina Niu, Qingguo Zhou, Rui Zhou, Xiaokang Zhou
    in the Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering

  • [ESWA’23] Code classification with graph neural networks: Have you ever struggled to make it work?
    Qingchen Yu#, Xin Liu#*, Qingguo Zhou, Jianwei Zhuge, Chunming Wu*
    Expert Systems with Applications 233, 120978

  • [ACL’23] Not the End of Story: An Evaluation of ChatGPT-Driven Vulnerability Description Mappings
    Xin Liu, Yuan Tan, Zhenghang Xiao, Jianwei Zhuge*, Rui Zhou
    in the Findings of the Association for Computational Linguistics: ACL 2023

  • [ESEM’22] PG-VulNet: Detect Supply Chain Vulnerabilities in IoT Devices using Pseudo-code and Graphs
    Xin Liu#, Yixiong Wu#, Qingchen Yu, Shangru Song, Yue Liu, Qingguo Zhou, Jianwei Zhuge*
    in the Proceedings of the 16th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement

DeepFake Voice

  • [MM’24] What’s the Real: A Novel Design Philosophy for Robust AI-Synthesized Voice Detection
    Xuan Hai#, Xin Liu#*, Yuan Tan, Gang Liu*, Song Li*, Weina Niu, Rui Zhou, Xiaokang Zhou
    in the Proceedings of the 32nd ACM International Conference on Multimedia

  • [ICME’24] Ghost-in-Wave: How Speaker-Irrelative Features Interfere DeepFake Voice Detectors
    Xuan Hai#, Xin Liu#*, Zhaorun Chen, Yuan Tan, Song Li, Weina Niu, Gang Liu*, Rui Zhou, Qingguo Zhou
    in the Proceedings of the IEEE Conference on Multimedia Expo 2024

  • [MM’23] SiFDetectCracker: An Adversarial Attack Against Fake Voice Detection Based on Speaker-Irrelative Features
    Xuan Hai#, Xin Liu#*, Yuan Tan, Qingguo Zhou*
    in the Proceedings of the 31st ACM International Conference on Multimedia

  • [ISSRE’23] Hidden-in-Wave: A Novel Idea to Camouflage AI-Synthesized Voices Based on Speaker-Irrelative Features
    Xin Liu, Yuan Tan, Xuan Hai, Qingchen Yu, Qingguo Zhou*
    in the Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering

Intrusion Detection & Prevention

  • [SoCC’24] SQLStateGuard: Statement-Level SQL Injection Defense Based on Learning-Driven Middleware
    Xin Liu, Yuanyuan Huang#, Tianyi Wang#, Song Li*, Weina Niu, Jun Shen, Qingguo Zhou*, Xiaokang Zhou
    in the Proceedings of the 15th ACM Symposium on Cloud Computing

  • [TST’24] SmartEagleEye: A Cloud-Oriented Webshell Detection System Based on Dynamic Gray-Box and Deep Learning
    Xin Liu, Yingli Zhang, Qingchen Yu, Jiajun Min, Jun Shen, Rui Zhou, Qingguo Zhou*
    Tsinghua Science and Technology 29 (3), 766-783

  • [CCOS’22] TCN enhanced novel malicious traffic detection for IoT devices
    Xin Liu#, Ziang Liu#, Zhang Yingli, Zhang Wenqiang, Lv Dong, Zhou Qingguo*
    Connection Science 34 (1), 1322-1341

  • [CC’21] MECGuard: GRU enhanced attack detection in Mobile Edge Computing environment
    Xin Liu, Wenqiang Zhang#, Xiaokang Zhou, Qingguo Zhou*
    Computer Communications 172, 1-9

Blockchain

  • [DCN’25] Novel MITM attack scheme based on built-in negotiation for blockchain-based digital twins
    Xin Liu, Rui Zhou, Shohei Shimizu, Rui Chong, Qingguo Zhou*, Xiaokang Zhou
    Digital Communications and Networks, in Press

  • [IOTJ’23] An Efficient Smart Contract Vulnerability Detector Based on Semantic Contract Graphs Using Approximate Graph Matching
    Yingli Zhang#, Jiali Ma#, Xin Liu*, Guodong Ye, Qun Jin, Jianhua Ma, Qingguo Zhou*
    IEEE Internet of Things Journal 10 (24), 21431-21442

  • [COMSCI’22] Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts
    Yingli Zhang, Jiali Ma, Ziang Liu, Xin Liu, Rui Zhou*
    Computer Science, 49(03), 52-61

  • [IJIM’20] An intelligent blockchain-based system for safe vaccine supply and supervision
    Binbin Yong, Jun Shen, Xin Liu, Fucun Li, Huaming Chen, Qingguo Zhou*
    International Journal of Information Management 52, 102024

Hobby Research

  • [SP’24] Advanced Ultrasonic Jamming Technology for Privacy Protection: Dynamic Inter-modulation (DIM) Algorithm
    Hetian Shi, Shangru Song, Jianwei Zhuge*, Xin Liu
    In 45th IEEE Symposium on Security and Privacy (S&P): Posters

  • [CHES’24] Laser-Based Command Injection Attacks on Voice-Controlled Microphone Arrays
    Hetian Shi, Yi He, Qing Wang, Jianwei Zhuge*, Qi Li, Xin Liu
    in the IACR Transactions on Cryptographic Hardware and Embedded Systems (2024)

  • [FC’16] A Logistics Privacy Protection System Based on Cloud Computing
    Xin Liu, Bingmeng Hu, Qingguo Zhou*, Jingfeng Liu
    Frontier Computing: Theory, Technologies and Applications FC 2016 5, 455-461