General

Qixu Liu,  Ph.D

Professor,  Ph.D.Supervisor 

liuqixu@iie.ac.cn

Research Areas

Web Security, Malware Analysis, Vulnerability Detection, Threat Detection and Defenses, Cyber Deception

Education

2002.9-2006.7, University of Science and Technology of China(USTC), Information Security, B.S
2006.9-2011.5, University of Chinese Academy of Sciences(UCAS), Information Security, Ph.D 

Experience

2020.10-NowInstitute of Information Engineering,CAS, Professor

2015.10-2020.10, Institute of Information Engineering,CAS, Associate Professor

2013.09-2015.10, University of Chinese Academy of Sciences(UCAS), Lecturer

2011.06-2013.09, University of Chinese Academy of Sciences(UCAS), Postdoctor

Publications

DBLP: Qixu Liu

[1]. Xinyu Liu, Ze Jin, Jiaxi Liu, Wei Liu, Xiaoxi Wang, Qixu Liu*.  ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications. the 39th Applied Computer Security Applications Conference (ACSAC 2023), Austin, Texas, USA. December 4-8, 2023.

[2]. Xingchen Chen, Baizhu Wang, Ze Jin, Yun Feng, Xianglong Li, Xincheng Feng, Qixu Liu*Tabby: Automated Gadget Chain Detection for Java Deserialization Vulnerabilities. The 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network (DSN 2023). Porto, Portugal, June 27-30, 2023.

[3]. Haozhen Zhang, Le Yu, Xi Xiao, Qing Li, Francesco Mercaldo, Xiapu Luo and Qixu LiuTFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification. The Web Conference 2023 (WWW 2023). AUSTIN, TEXAS, USA. APRIL 30 - MAY 4, 2023. 

[4]. Ze Jin, Luyi Xing*, Yiwei Fang, Yan Jia, Bin Yuan, Qixu Liu*. P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies. The 29th ACM Conference on Computer and Communications Security (ACM CCS 2022). Los Angeles, USA. November 7-11, 2022

[5]. Junnan Wang,  Qixu Liu*, Di Wu, Ying Dong and Xiang Cui. Crafting Adversarial Example to Bypass Flow-&ML-based Botnet Detector via RL, The 24th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2021), Donostia / San Sebastian, Spain on October 6-8, 2021

[6].Zihao Zhao, Qixu Liu*, et.al. WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning. 21st International Conference on Information and Communications Security(ICICS 2019),  Beijing, China, Dec15-17, 2019

[7]. Kaili Qiu, Qixu Liu*, et.al. An Empirical study of OAuth-based SSO System on Web. the 13th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2018), Tianjin, China, June 20-22, 2018

[8]. Zhejun FangQixu Liu, et.al. A Static Technique For Detecting Input Validation Vulnerability in Android Apps. SCIENCE CHINA Information Sciences.60(5): 052111:1-052111:16. 2017

[9]. Qianru Wu, Qixu Liu, Yuqing Zhang, Pen Liu and Guanxing Wen. A Machine Learning Approach for Detecting Third-Party Trackers on the Web. 21st European Symposium on Research in Computer Security(ESORICS 2016), Greece, Heraklion, 26 - 30 September 2016

[10]. Qianru Wu, Qixu Liu, Yuqing Zhang and Guanxing Wen. TrackerDetector:a System to Detect Third-Party Trackers through Machine Learning. Computer Networks - Elsevier. Volume 91, Pages 164-173, November 14, 2015.

[11]. Yuqing Zhang, Qixu Liu, Qihan Luo, Xaili Wang. XAS: cross-API scripting attacks in social ecosystems. SCIENCE CHINA Information Sciences. 58(1): 012101(14), 2015.

[12]. Guanxing Wen, Yuqing Zhang, Qixu Liu, Dingning Yang, Fuzzing the ActionScript Virtual Machine. 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Hangzhou, China, full paper, 2013.5

[13]. Qixu Liu, Yuqing Zhang, Ying Kong, Qianru Wu. Improving VRSS-based vulnerability prioritization using analytic hierarchy process. Journal of Systems and Software - Elsevier, 85(8): pages: 1699-1708, 2012.8 

[14].Qixu Liu, Yuqing Zhang. VRSS: A New System for Rating and Scoring Vulnerabilities. Computer Communications - Elsevier, 34(3): pages: 264-273, 2011.3

[15].Qixu Liu, Yuqing Zhang. TFTP vulnerability finding technique based on fuzzing. Computer Communications - Elsevier, 31(14): pages: 3420-3426, 2008.9