基本信息

刘峰  男  博导  中国科学院信息工程研究所
电子邮件: liufeng-AT-iie.ac.cn
通信地址: 北京市海淀区树村路19号

个人主页:https://fengliu.net.cn

研究领域

信息安全体系与战略,网络攻防演化理论,视觉安全理论与技术
Strategic and economic aspects of information security, Network Attack and Defense throey, visual security and cryptography

招生信息

   
招生专业
083900-网络空间安全
招生方向
信息对抗理论与技术,信息安全战略研究,密码学

教育背景

2003-09--2009-01   软件研究所   博士
1999-09--2003-07   山东大学   学士

教授课程

网络空间安全战略

出版信息

   
发表论文
[1] 王志伟, 刘峰. Online/offline and History Indexing Identity-based Fuzzy Message Detection. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2023, 18: 5553-5566, [2] 王强, 李文灏, 鲍怀锋, 汤子贤, 王文, 刘峰. High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree. MILCOM 2022null. 2022, [3] 张元天, 刘峰. Optimal Strategy Selection for Attack Graph Games Using Deep Reinforcement Learning. HPCC2022[J]. 2022, [4] 刘家志, 刘峰. Robust Stereo Matching with an Unfixed and Adaptive Disparity Search Range. ICPR 2022null. 2022, [5] 刘丽艳, 李丰, 邹燕燕, 周建华, 朴爱花, 刘峰, 霍玮. SiCsFuzzer:基于稀疏插桩的闭源软件模糊测试方法. 信息安全学报[J]. 2022, 7(4): 55-70, http://lib.cqvip.com/Qikan/Article/Detail?id=7107787220.
[6] 张元天, 刘峰. Optimal Strategy Selection for Cyber Deception via Deep Reinforcement Learning. IEEE UIC 2022 (The 2022 IEEE International Conference on Ubiquitous Intelligence and Computing, 15-18 December, Haikou China)null. 2022, [7] 刘家志, 刘峰. A novel stereo matching pipeline with robustness and unfixed disparity search range. IEEE ICME 2022null. 2022, [8] 刘家志, 刘峰. Modified 2D-Ghost-Free Stereoscopic Display with Depth-of-Field Effects. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM)[J]. 2022, [9] 贾锟, 刘峰. Hybrid Routing for Efficient Fine-Grained Management of Specific Services in SDN. SciSec 2022null. 2022, [10] 汤子贤, Feng Liu. HSLF: HTTP Header Sequence based LSH fingerprints for Application Traffic Classification. ICCS 2021[J]. 2021, [11] 汤子贤, Feng Liu. Mining Trojan Detection Based on Multi-dimensional Static Features. SciSec 2021[J]. 2021, [12] 刘峰. 基于网络空间欺骗的移动目标防御技术研究. 信息安全学报. 2021, [13] Duohe Ma. What You See Is Not What You Get: Towards Deception-Based Data Moving Target Defense. IEEE International Performance Computing and Communications Conference. 2020, [14] 刘峰. SiCsFuzzer:基于稀疏插桩的闭源软件模糊测试方法. 信息安全学报. 2020, [15] Feng Liu. WGT: Thwarting Web Attacks Through Web Gene Tree-based Moving Target Defense. IEEE International Conference on Web Services. 2020, [16] Yan, Dingyu, Liu, Feng, Jia, Kun, IEEE. Modeling an Information-based Advanced Persistent Threat Attack on the Internal Network. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2019, [17] Yan, Dingyu, Liu, Feng, IEEE Comp Soc. A Heuristic Method for Network Modification against Cyber Epidemic Attacks. 2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019)null. 2019, 184-191, [18] Yan, Dingyu, Liu, Feng, Zhang, Yaqin, Jia, Kun. Dynamical model for individual defence against cyber epidemic attacks. IET INFORMATION SECURITY[J]. 2019, 13(6): 541-551, http://dx.doi.org/10.1049/iet-ifs.2018.5147.
[19] Xu, Yuwei, Liu, Feng, Wu, Chuankun. Preimage Distributions of Perfect Nonlinear Functions and Vectorial Plateaued Functions. CHINESE JOURNAL OF ELECTRONICS[J]. 2019, 28(5): 933-937, http://lib.cqvip.com/Qikan/Article/Detail?id=7002864930.
[20] Xu, Tao, Liu, Feng, Wu, Chuankun. A white-box AES-like implementation based on key-dependent substitution-linear transformations. MULTIMEDIA TOOLS AND APPLICATIONS[J]. 2018, 77(14): 18117-18137, https://www.webofscience.com/wos/woscc/full-record/WOS:000440050900030.
[21] Shen, Gang, Liu, Feng, Fu, Zhengxin, Yu, Bin. Visual cryptograms of random grids via linear algebra. MULTIMEDIA TOOLS AND APPLICATIONS[J]. 2018, 77(10): 12871-12899, https://www.webofscience.com/wos/woscc/full-record/WOS:000433202100054.
[22] Feng Liu. Characterizing the Optimal Attack Strategy Decision in Cyber Epidemic Attacks with Limited Resources. 1st International Conference on Science of Cyber Security. 2018, [23] Xu, Tao, Wu, Chuankun, Liu, Feng, Zhao, Ruoxin. Protecting white-box cryptographic implementations with obfuscated round boundaries. SCIENCE CHINA-INFORMATION SCIENCES. 2018, 61(3): https://www.webofscience.com/wos/woscc/full-record/WOS:000417486900009.
[24] Ren, Yawei, Liu, Feng, Guo, Teng, Feng, Rongquan, Lin, Dongdai. Cheating prevention visual cryptography scheme using Latin square. IET INFORMATION SECURITY[J]. 2017, 11(4): 211-219, https://www.webofscience.com/wos/woscc/full-record/WOS:000404112600006.
[25] Shen, Gang, Liu, Feng, Fu, Zhengxin, Yu, Bin. New insight into linear algebraic technique to construct visual cryptography scheme for general access structure. MULTIMEDIA TOOLS AND APPLICATIONS[J]. 2017, 76(12): 14511-14533, https://www.webofscience.com/wos/woscc/full-record/WOS:000402732800036.
[26] Shen, Gang, Liu, Feng, Fu, Zhengxin, Yu, Bin. Perfect contrast XOR-based visual cryptography schemes via linear algebra. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2017, 85(1): 15-37, https://www.webofscience.com/wos/woscc/full-record/WOS:000408721500002.
[27] Chen, Huashan, Zhao, Xiuyan, Liu, Feng, Xu, Shouhuai, Lu, Wenlian. Optimizing interconnections to maximize the spectral radius of interdependent networks. PHYSICAL REVIEW E[J]. 2017, 95(3): 032308-1-032308-15, http://dx.doi.org/10.1103/PhysRevE.95.032308.
[28] Yin, Jiaxin, Wang, Rui, Guo, Yuanfang, Liu, Feng, Shi, YQ, Kim, HJ, PerezGonzalez, F, Liu, F. An Adaptive Reversible Data Hiding Scheme for JPEG Images. DIGITAL FORENSICS AND WATERMARKING, IWDW 2016null. 2017, 10082: 456-469, [29] Ren, Yawei, Liu, Feng, Wang, Wen, Shi, YQ, Kim, HJ, PerezGonzalez, F, Liu, F. Collusive Attacks to Partition Authentication Visual Cryptography Scheme. DIGITAL FORENSICS AND WATERMARKING, IWDW 2016null. 2017, 10082: 238-250, [30] Wang Wen, Liu Feng, Guo Teng, Ren Yawei, Kraetzer C, Shi YQ, Dittmann J, Kim HJ. Temporal Integration Based Visual Cryptography Scheme and Its Application. DIGITAL FORENSICS AND WATERMARKINGnull. 2017, 10431: 406-419, [31] Shen, Gang, Liu, Feng, Fu, Zhengxin, Yu, Bin, Wang, Wen, Shi, YQ, Kim, HJ, PerezGonzalez, F, Liu, F. Halftone Visual Cryptography with Complementary Cover Images. DIGITAL FORENSICS AND WATERMARKING, IWDW 2016null. 2017, 10082: 223-237, [32] Feng Liu. Information Security Display Technology with Cheating Effect. 15th International Workshop on Digital-forensics and Watermarking. 2017, [33] Xu, Yuwei, Li, Yongqiang, Wu, Chuankun, Liu, Feng. On the construction of differentially 4-uniform involutions. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2017, 47: 309-329, https://www.webofscience.com/wos/woscc/full-record/WOS:000407407500019.
[34] Guo, Teng, Liu, Feng, Wang, Wen, Yu, BingTao, Shi, YQ, Kim, HJ, PerezGonzalez, F, Liu, F. Privacy Monitor. DIGITAL FORENSICS AND WATERMARKING, IWDW 2016null. 2017, 10082: 187-197, [35] Wang, Guangyu, Liu, Feng, Yan, Wei Qi. 2D Barcodes for visual cryptography. MULTIMEDIA TOOLS AND APPLICATIONS[J]. 2016, 75(2): 1223-1241, [36] Dongdai Lin. The Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity. ISPEC 2016. 2016, [37] Dongdai Lin. The Linear Complexity and 2-Error Linear Complexity Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed Hamming Weight. ICICS 2016. 2016, [38] Wang Guangyu, Liu Feng. Basic Visual Cryptography Using Braille. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS (IJDCF)[J]. 2016, [39] Feng Liu. Event Analogy Based Privacy Preservation in Visual Surveillance. PSIVT 2015. 2015, [40] []. Enhanced Color Visual Cryptography using Halftoning Schemes. AENSI. 2015, http://oa.las.ac.cn/oainone/service/browseall/read1?ptype=JA&workid=JA201902180266790ZK.
[41] Feng Liu. A New Construction of Tagged Visual Cryptography Scheme. IWDW2015. 2015, [42] Feng Liu. An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion. IWDW2015. 2015, [43] Teng Guo, Feng Liu, ChuanKun Wu, YaWei Ren, Wen Wang. On (k, n) Visual Cryptography Scheme with t Essential Parties. INFORMATION THEORETIC SECURITY, ICITS 2013null. 2014, 8317: 56-68, [44] 赵倩, 刘峰, 林东岱. 美国网络空间安全教育战略计划. 中国信息安全[J]. 2014, 91-94, http://lib.cqvip.com/Qikan/Article/Detail?id=661884058.
[45] Guo, Teng, Liu, Feng, Wu, ChuanKun. k out of k extended visual cryptography scheme by random grids. SIGNAL PROCESSING[J]. 2014, 94: 90-101, http://dx.doi.org/10.1016/j.sigpro.2013.06.003.
[46] Feng Liu. Flexible Visual Cryptography Scheme Without Distortion and Its Application. Springer Transactions on Data Hiding and Multimedia Security. 2013, [47] Feng Liu. ESSVCS: An Enriched Secre Sharing Visual Cryptography. Springer Transactions on Data Hiding and Multimedia Security. 2013, [48] Teng Guo, Feng Liu, ChuanKun Wu. Threshold visual secret sharing by random grids with improved contrast. THE JOURNAL OF SYSTEMS & SOFTWARE. 2013, 86(8): 2094-2109, http://dx.doi.org/10.1016/j.jss.2013.03.062.
[49] Guo, Teng, Liu, Feng, Wu, ChuanKun. Threshold visual secret sharing by random grids with improved contrast. JOURNAL OF SYSTEMS AND SOFTWARE[J]. 2013, 86(8): 2094-2109, http://dx.doi.org/10.1016/j.jss.2013.03.062.
[50] 林东岱, 刘峰. 美国信息安全保密体系初探. 保密科学技术[J]. 2012, 6-13, http://lib.cqvip.com/Qikan/Article/Detail?id=1003479771.
[51] Feng Liu. Visual Cryptography for Natural Images and Visual Voting. Inscrypt2012. 2012, [52] Liu, Feng, Guo, Teng, Wu, ChuanKun, Qian, Lina. Improving the visual quality of size invariant visual cryptography scheme. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION[J]. 2012, 23(2): 331-342, http://dx.doi.org/10.1016/j.jvcir.2011.11.003.
[53] 李鹏, 马培军, 苏小红, 刘峰. 多重门限的图像秘密共享方案. 电子学报[J]. 2012, 40(3): 518-524, http://lib.cqvip.com/Qikan/Article/Detail?id=41636936.
[54] Feng Liu. On the Equivalence of Two Definitions of Visual Cryptography Scheme. ISPEC 2012. 2012, [55] Liu, F, Wu, C, Lin, X. Cheating immune visual cryptography scheme. IET INFORMATION SECURITY[J]. 2011, 5(1): 51-59, https://www.webofscience.com/wos/woscc/full-record/WOS:000295122600007.
[56] Liu, Feng, Wu, Chuankun. Embedded Extended Visual Cryptography Schemes. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2011, 6(2): 307-322, https://www.webofscience.com/wos/woscc/full-record/WOS:000290737100006.
[57] Ching-Nung Yang, Chih-Cheng Wu, Feng Liu. Construction of General (k, n) Probabilistic Visual Cryptography Scheme. 电子科技学刊:英文版[J]. 2011, 9(4): 317-324, http://lib.cqvip.com/Qikan/Article/Detail?id=40735635.
[58] Liu, Feng, Wu, Chuankun, Lin, Xijun. Step Construction of Visual Cryptography Schemes. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2010, 5(1): 27-38, https://www.webofscience.com/wos/woscc/full-record/WOS:000274737400003.
[59] Liu, Feng, Wu, ChuanKun, Lin, XiJun. A new definition of the contrast of visual cryptography scheme. INFORMATION PROCESSING LETTERS[J]. 2010, 110(7): 241-246, https://www.webofscience.com/wos/woscc/full-record/WOS:000275923700001.
[60] Liu, Feng, Wu, ChuanKun, Lin, XiJun. Some Extensions on Threshold Visual Cryptography Schemes. COMPUTER JOURNAL[J]. 2010, 53(1): 107-119, http://www.corc.org.cn/handle/1471x/2411929.
[61] Feng Liu. The Alignment Problem of the Visual Cryptography Scheme. Designs, codes and cryptography. 2009, 
发表著作
(1) 美国网络空间安全体系, Overview of the Cybersecurity System in USA, 科学出版社, 2015-01, 第 1 作者
(2) 视觉密码学理论、方法与应用, Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications (Second Edition), Springer-Verlag London, 2015-06, 第 1 作者
(3) Proceedings of 1st International Workshop on Science of Cybersecurity, Springer, 2018-08, 第 1 作者
(4) Proceedings of 2nd International Workshop on Science of Cybersecurity, Springer, 2019-11, 第 1 作者

专利与奖励

   
专利成果
[1] 刘峰, 李琳, 汤子贤, 王强, 王文. 基于HTTP请求有效负载的漏洞攻击流量检测方法和系统. CN: CN114866279B, 2023-07-25.
[2] 张晓宇, 李文灏, 刘峰. 基于直推图的加密流量识别与分类方法及系统. CN: CN114866301B, 2023-05-02.
[3] 张晓宇, 李文灏, 刘峰. 一种基于可解释人工智能的实时入侵检测方法及系统. CN202211571092.X, 2022-12-08.
[4] 张晓宇, 李文灏, 刘峰. 基于优化元学习的轻量恶意软件流量检测方法及装置. CN: CN115225310A, 2022-10-21.
[5] 张晓宇, 李文灏, 刘峰. 基于对抗扰动的实时网络连接隐私保护方法和系统. CN: CN115174147A, 2022-10-11.
[6] 张晓宇, 李文灏, 刘峰. 基于图匹配的不同网络环境的加密流量分类方法及系统. CN: CN114978593A, 2022-08-30.
[7] 张晓宇, 李文灏, 刘峰. 基于直推图的加密流量识别与分类方法及系统. CN: CN114866301A, 2022-08-05.
[8] 刘峰, 李琳, 汤子贤, 王强, 王文. 基于HTTP请求有效负载的漏洞攻击流量检测方法和系统. CN: CN114866279A, 2022-08-05.
[9] 张晓宇, 李文灏, 刘峰. 基于对抗扰动的实时网络连接隐私保护方法和系统. CN202210622904.2, 2022-06-01.
[10] 张晓宇, 李文灏, 刘峰. 基于直推图的加密流量识别与分类方法及系统. CN202210440703.0, 2022-04-25.
[11] 张晓宇, 李文灏, 刘峰. 基于图匹配的不同网络环境的加密流量分类方法及系统. CN202210397693.7, 2022-04-15.
[12] 刘峰, 刘家志, 王文. 3D-2D同步显示方法及系统. CN: CN113014902A, 2021-06-22.
[13] 刘峰, 王文, 刘家志. 防偷窥的安全显示方法、具有欺伪效果的安全显示方法及安全显示系统. CN: CN107680543A, 2018-02-09.
[14] 刘峰, 郭腾. 一种基于视觉密码的隐私保护显示器实现方法. CN: CN104269150A, 2015-01-07.

科研活动

   
科研项目
( 1 ) 视觉密码方案的构造, 负责人, 国家任务, 2010-01--2012-12
( 2 ) 海云信息安全体系与共性技术研究, 参与, 中国科学院计划, 2012-01--2016-12
( 3 ) 针对视觉密码应用的若干关键问题研究, 参与, 研究所自选, 2013-01--2013-12
( 4 ) 中国科学院青年创新促进会, 负责人, 中国科学院计划, 2014-01--2017-12
( 5 ) 未来信息技术研究, 参与, 中国科学院计划, 2012-01--2016-12
( 6 ) 视觉安全若干关键问题研究, 负责人, 国家任务, 2017-01--2020-12
( 7 ) 网络威胁发现项目, 负责人, 地方任务, 2019-07--2020-12
( 8 ) 多源数据获取, 负责人, 中国科学院计划, 2019-01--2022-12
( 9 ) 某工程, 负责人, 其他任务, 2022-01--2023-12