Attack Techniques & Tools
[SP’24] Advanced Ultrasonic Jamming Technology for Privacy Protection: Dynamic Inter-modulation (DIM) Algorithm
Hetian Shi, Shangru Song, Jianwei Zhuge*, Xin Liu
In 45th IEEE Symposium on Security and Privacy (S&P): Posters[CHES’24] Laser-Based Command Injection Attacks on Voice-Controlled Microphone Arrays
Hetian Shi, Yi He, Qing Wang, Jianwei Zhuge*, Qi Li, Xin Liu
in the IACR Transactions on Cryptographic Hardware and Embedded Systems (2024)[MM’23] SiFDetectCracker: An Adversarial Attack Against Fake Voice Detection Based on Speaker-Irrelative Features
Xuan Hai#, Xin Liu#*, Yuan Tan, Qingguo Zhou*
in the Proceedings of the 31st ACM International Conference on Multimedia[BHUSA’22] Human or Not: Can You Really Detect the Fake Voices?
Xin Liu, Yuan Tan, Rui Chong, Xiaokang Zhou, Mingyuan Zhang, Qingguo Zhou*
Black Hat USA 2022: AI, ML, & Data Science[BHASIA’21] Disappeared Coins: Steal Hashrate in Stratum Secretly
Xin Liu, Rui Chong, Yuanyuan Huang, Yingli Zhang, Qingguo Zhou*
Black Hat Asia 2021: Applied Security
Vulnerability Discovery & Detection
[ESWA’23] Code classification with graph neural networks: Have you ever struggled to make it work?
Qingchen Yu#, Xin Liu#*, Qingguo Zhou, Jianwei Zhuge, Chunming Wu*
Expert Systems with Applications 233, 120978[FGCS’23] Novel supply chain vulnerability detection based on heterogeneous-graph-driven hash similarity in IoT
Guodong Ye#, Xin Liu#*, Siqi Fan, Yuan Tan, Qingguo Zhou*, Rui Zhou, Xiaokang Zhou
Future Generation Computer Systems 148, 201-210[IOTJ’23] An Efficient Smart Contract Vulnerability Detector Based on Semantic Contract Graphs Using Approximate Graph Matching
Yingli Zhang#, Jiali Ma#, Xin Liu*, Guodong Ye, Qun Jin, Jianhua Ma, Qingguo Zhou*
IEEE Internet of Things Journal 10 (24), 21431-21442[ESEM’22] PG-VulNet: Detect Supply Chain Vulnerabilities in IoT Devices using Pseudo-code and Graphs
Xin Liu#, Yixiong Wu#, Qingchen Yu, Shangru Song, Yue Liu, Qingguo Zhou, Jianwei Zhuge*
in the Proceedings of the 16th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement[COMSCI’22] Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts
Yingli Zhang, Jiali Ma, Ziang Liu, Xin Liu, Rui Zhou*
Computer Science, 49(03), 52-61
Security Analysis & Governance
[ICME’24] Ghost-in-Wave: How Speaker-Irrelative Features Interfere DeepFake Voice Detectors
Xuan Hai#, Xin Liu#*, Zhaorun Chen, Yuan Tan, Song Li, Weina Niu, Gang Liu*, Rui Zhou, Qingguo Zhou
in the Proceedings of the IEEE Conference on Multimedia Expo 2024[ACL’23] Not the End of Story: An Evaluation of ChatGPT-Driven Vulnerability Description Mappings
Xin Liu, Yuan Tan, Zhenghang Xiao, Jianwei Zhuge*, Rui Zhou
in the Findings of the Association for Computational Linguistics: ACL 2023[ISSRE’23] Hidden-in-Wave: A Novel Idea to Camouflage AI-Synthesized Voices Based on Speaker-Irrelative Features
Xin Liu, Yuan Tan, Xuan Hai, Qingchen Yu, Qingguo Zhou*
in the Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering[IJIM’20] An intelligent blockchain-based system for safe vaccine supply and supervision
Binbin Yong, Jun Shen, Xin Liu, Fucun Li, Huaming Chen, Qingguo Zhou*
International Journal of Information Management 52, 102024[FC’18] A Logistics Privacy Protection System Based on Cloud Computing
Xin Liu, Bingmeng Hu, Qingguo Zhou*, Jingfeng Liu
Frontier Computing: Theory, Technologies and Applications FC 2016 5, 455-461
Intrusion Detection & Prevention
[DCN’24] Novel MITM attack scheme based on built-in negotiation for blockchain-based digital twins
Xin Liu, Rui Zhou, Shohei Shimizu, Rui Chong, Qingguo Zhou*, Xiaokang Zhou
Digital Communications and Networks, in Press[TST’24] SmartEagleEye: A Cloud-Oriented Webshell Detection System Based on Dynamic Gray-Box and Deep Learning
Xin Liu, Yingli Zhang, Qingchen Yu, Jiajun Min, Jun Shen, Rui Zhou, Qingguo Zhou*
Tsinghua Science and Technology 29 (3), 766-783[CCOS’22] TCN enhanced novel malicious traffic detection for IoT devices
Xin Liu#, Ziang Liu#, Zhang Yingli, Zhang Wenqiang, Lv Dong, Zhou Qingguo*
Connection Science 34 (1), 1322-1341[CC’21] MECGuard: GRU enhanced attack detection in Mobile Edge Computing environment
Xin Liu, Wenqiang Zhang#, Xiaokang Zhou, Qingguo Zhou*
Computer Communications 172, 1-9[ADHOC’19] Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device
Fang Feng, Xin Liu, Binbin Yong, Rui Zhou, Qingguo Zhou*
Ad Hoc Networks 84, 82-89