基本信息

刘峰  男  博导  中国科学院信息工程研究所
电子邮件: liufeng-AT-iie.ac.cn
通信地址: 北京市海淀区树村路19号

个人主页:https://fengliu.net.cn

研究领域

网络攻防对抗理论与技术,网络空间安全战略

招生信息

   
招生专业
083900-网络空间安全
招生方向
信息对抗理论与技术,信息安全战略研究,密码学

教育背景

2003-09--2009-01   软件研究所   博士
1999-09--2003-07   山东大学   学士

教授课程

网络空间安全战略

出版信息

   
发表论文
[1] 鲍怀锋, 李文灏, 陈华山, 缪涵, 汤子贤, 刘峰. Stories behind decisions: : Towards interpretable malware family classification with hierarchical attention. Computers & Security[J]. 2024, 第 6 作者144(C): 
[2] 王星宇, 鲍怀锋, 李文灏, 王文, 刘峰. A Framework for Intelligent Generation of Intrusion Detection Rules Based on Grad-CAM. 24th International Conference Computational Science – ICCS 2024:. 2024, 第 5 作者null(null): https://dl.acm.org/doi/10.1007/978-3-031-63783-4_12.
[3] 蔡伟霞, 陈华山, 刘峰. Optimal Defense Strategy for Multi-agents Using Value Decomposition Networks. Advanced Intelligent Computing Technology and Applications: 20th International Conference, ICIC 2024. 2024, 第 3 作者null(null): https://dl.acm.org/doi/10.1007/978-981-97-5581-3_41.
[4] 王志伟, 刘峰. Online/offline and History Indexing Identity-based Fuzzy Message Detection. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2023, 第 2 作者18: 5553-5566, 
[5] 王强, 李文灏, 鲍怀锋, 汤子贤, 王文, 刘峰. High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree. MILCOM 2022. 2022, 第 6 作者
[6] 张元天, 刘峰. Optimal Strategy Selection for Attack Graph Games Using Deep Reinforcement Learning. HPCC2022[J]. 2022, 第 2 作者
[7] 刘家志, 刘峰. Robust Stereo Matching with an Unfixed and Adaptive Disparity Search Range. ICPR 2022. 2022, 第 2 作者
[8] 刘丽艳, 李丰, 邹燕燕, 周建华, 朴爱花, 刘峰, 霍玮. SiCsFuzzer:基于稀疏插桩的闭源软件模糊测试方法. 信息安全学报[J]. 2022, 第 6 作者7(4): 55-70, http://lib.cqvip.com/Qikan/Article/Detail?id=7107787220.
[9] 张元天, 刘峰. Optimal Strategy Selection for Cyber Deception via Deep Reinforcement Learning. IEEE UIC 2022 (The 2022 IEEE International Conference on Ubiquitous Intelligence and Computing, 15-18 December, Haikou China). 2022, 第 2 作者
[10] 刘家志, 刘峰. A novel stereo matching pipeline with robustness and unfixed disparity search range. IEEE ICME 2022. 2022, 第 2 作者
[11] 刘家志, 刘峰. Modified 2D-Ghost-Free Stereoscopic Display with Depth-of-Field Effects. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM)[J]. 2022, 第 2 作者
[12] 贾锟, 刘峰. Hybrid Routing for Efficient Fine-Grained Management of Specific Services in SDN. SciSec 2022. 2022, 第 2 作者
[13] 汤子贤, Feng Liu. HSLF: HTTP Header Sequence based LSH fingerprints for Application Traffic Classification. ICCS 2021[J]. 2021, 第 2 作者
[14] 汤子贤, Feng Liu. Mining Trojan Detection Based on Multi-dimensional Static Features. SciSec 2021[J]. 2021, 第 2 作者
[15] 刘峰. 基于网络空间欺骗的移动目标防御技术研究. 信息安全学报. 2021, 第 1 作者
[16] 贾锟, 王君楠, 刘峰. SDN环境下的DDoS检测与缓解机制. 信息安全学报[J]. 2021, 第 3 作者6(1): 17-31, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20210102&flag=1.
[17] Duohe Ma. What You See Is Not What You Get: Towards Deception-Based Data Moving Target Defense. IEEE International Performance Computing and Communications Conference. 2020, 
[18] 刘峰. SiCsFuzzer:基于稀疏插桩的闭源软件模糊测试方法. 信息安全学报. 2020, 第 1 作者
[19] Feng Liu. WGT: Thwarting Web Attacks Through Web Gene Tree-based Moving Target Defense. IEEE International Conference on Web Services. 2020, 第 1 作者
[20] Yan, Dingyu, Liu, Feng, Jia, Kun, IEEE. Modeling an Information-based Advanced Persistent Threat Attack on the Internal Network. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2019, 第 2 作者
[21] Yan, Dingyu, Liu, Feng, IEEE Comp Soc. A Heuristic Method for Network Modification against Cyber Epidemic Attacks. 2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019). 2019, 第 2 作者184-191, 
[22] Yan, Dingyu, Liu, Feng, Zhang, Yaqin, Jia, Kun. Dynamical model for individual defence against cyber epidemic attacks. IET INFORMATION SECURITY[J]. 2019, 第 2 作者13(6): 541-551, https://www.doi.org/10.1049/iet-ifs.2018.5147.
[23] Xu, Yuwei, Liu, Feng, Wu, Chuankun. Preimage Distributions of Perfect Nonlinear Functions and Vectorial Plateaued Functions. CHINESE JOURNAL OF ELECTRONICS[J]. 2019, 第 2 作者28(5): 933-937, http://lib.cqvip.com/Qikan/Article/Detail?id=7002864930.
[24] Xu, Tao, Liu, Feng, Wu, Chuankun. A white-box AES-like implementation based on key-dependent substitution-linear transformations. MULTIMEDIA TOOLS AND APPLICATIONS[J]. 2018, 第 2 作者  通讯作者  77(14): 18117-18137, https://www.webofscience.com/wos/woscc/full-record/WOS:000440050900030.
[25] Shen, Gang, Liu, Feng, Fu, Zhengxin, Yu, Bin. Visual cryptograms of random grids via linear algebra. MULTIMEDIA TOOLS AND APPLICATIONS[J]. 2018, 第 2 作者77(10): 12871-12899, https://www.webofscience.com/wos/woscc/full-record/WOS:000433202100054.
[26] Feng Liu. Characterizing the Optimal Attack Strategy Decision in Cyber Epidemic Attacks with Limited Resources. 1st International Conference on Science of Cyber Security. 2018, 第 1 作者
[27] Xu, Tao, Wu, Chuankun, Liu, Feng, Zhao, Ruoxin. Protecting white-box cryptographic implementations with obfuscated round boundaries. SCIENCE CHINA-INFORMATION SCIENCES. 2018, 第 3 作者  通讯作者  61(3): https://www.webofscience.com/wos/woscc/full-record/WOS:000417486900009.
[28] Ren, Yawei, Liu, Feng, Guo, Teng, Feng, Rongquan, Lin, Dongdai. Cheating prevention visual cryptography scheme using Latin square. IET INFORMATION SECURITY[J]. 2017, 第 2 作者11(4): 211-219, https://www.webofscience.com/wos/woscc/full-record/WOS:000404112600006.
[29] Shen, Gang, Liu, Feng, Fu, Zhengxin, Yu, Bin. New insight into linear algebraic technique to construct visual cryptography scheme for general access structure. MULTIMEDIA TOOLS AND APPLICATIONS[J]. 2017, 第 2 作者76(12): 14511-14533, https://www.webofscience.com/wos/woscc/full-record/WOS:000402732800036.
[30] Shen, Gang, Liu, Feng, Fu, Zhengxin, Yu, Bin. Perfect contrast XOR-based visual cryptography schemes via linear algebra. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2017, 第 2 作者85(1): 15-37, https://www.webofscience.com/wos/woscc/full-record/WOS:000408721500002.
[31] Chen, Huashan, Zhao, Xiuyan, Liu, Feng, Xu, Shouhuai, Lu, Wenlian. Optimizing interconnections to maximize the spectral radius of interdependent networks. PHYSICAL REVIEW E[J]. 2017, 第 3 作者  通讯作者  95(3): 032308-1-032308-15, http://dx.doi.org/10.1103/PhysRevE.95.032308.
[32] Yin, Jiaxin, Wang, Rui, Guo, Yuanfang, Liu, Feng, Shi, YQ, Kim, HJ, PerezGonzalez, F, Liu, F. An Adaptive Reversible Data Hiding Scheme for JPEG Images. DIGITAL FORENSICS AND WATERMARKING, IWDW 2016. 2017, 第 4 作者10082: 456-469, 
[33] Ren, Yawei, Liu, Feng, Wang, Wen, Shi, YQ, Kim, HJ, PerezGonzalez, F, Liu, F. Collusive Attacks to Partition Authentication Visual Cryptography Scheme. DIGITAL FORENSICS AND WATERMARKING, IWDW 2016. 2017, 第 2 作者10082: 238-250, 
[34] Wang Wen, Liu Feng, Guo Teng, Ren Yawei, Kraetzer C, Shi YQ, Dittmann J, Kim HJ. Temporal Integration Based Visual Cryptography Scheme and Its Application. DIGITAL FORENSICS AND WATERMARKING. 2017, 第 2 作者10431: 406-419, 
[35] Shen, Gang, Liu, Feng, Fu, Zhengxin, Yu, Bin, Wang, Wen, Shi, YQ, Kim, HJ, PerezGonzalez, F, Liu, F. Halftone Visual Cryptography with Complementary Cover Images. DIGITAL FORENSICS AND WATERMARKING, IWDW 2016. 2017, 第 2 作者10082: 223-237, 
[36] Feng Liu. Information Security Display Technology with Cheating Effect. 15th International Workshop on Digital-forensics and Watermarking. 2017, 第 1 作者
[37] Xu, Yuwei, Li, Yongqiang, Wu, Chuankun, Liu, Feng. On the construction of differentially 4-uniform involutions. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2017, 第 4 作者47: 309-329, https://www.webofscience.com/wos/woscc/full-record/WOS:000407407500019.
[38] Guo, Teng, Liu, Feng, Wang, Wen, Yu, BingTao, Shi, YQ, Kim, HJ, PerezGonzalez, F, Liu, F. Privacy Monitor. DIGITAL FORENSICS AND WATERMARKING, IWDW 2016. 2017, 第 2 作者10082: 187-197, 
[39] Wang, Guangyu, Liu, Feng, Yan, Wei Qi. 2D Barcodes for visual cryptography. MULTIMEDIA TOOLS AND APPLICATIONS[J]. 2016, 第 2 作者75(2): 1223-1241, 
[40] Dongdai Lin. The Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity. ISPEC 2016. 2016, 
[41] Dongdai Lin. The Linear Complexity and 2-Error Linear Complexity Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed Hamming Weight. ICICS 2016. 2016, 
[42] Wang Guangyu, Liu Feng. Basic Visual Cryptography Using Braille. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS (IJDCF)[J]. 2016, 第 2 作者
[43] Feng Liu. Event Analogy Based Privacy Preservation in Visual Surveillance. PSIVT 2015. 2015, 第 1 作者
[44] []. Enhanced Color Visual Cryptography using Halftoning Schemes. AENSI. 2015, http://oa.las.ac.cn/oainone/service/browseall/read1?ptype=JA&workid=JA201902180266790ZK.
[45] Feng Liu. A New Construction of Tagged Visual Cryptography Scheme. IWDW2015. 2015, 第 1 作者
[46] Feng Liu. An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion. IWDW2015. 2015, 第 1 作者
[47] Teng Guo, Feng Liu, ChuanKun Wu, YaWei Ren, Wen Wang. On (k, n) Visual Cryptography Scheme with t Essential Parties. INFORMATION THEORETIC SECURITY, ICITS 2013. 2014, 第 2 作者8317: 56-68, 
[48] 赵倩, 刘峰, 林东岱. 美国网络空间安全教育战略计划. 中国信息安全[J]. 2014, 第 2 作者91-94, http://lib.cqvip.com/Qikan/Article/Detail?id=661884058.
[49] Guo, Teng, Liu, Feng, Wu, ChuanKun. k out of k extended visual cryptography scheme by random grids. SIGNAL PROCESSING[J]. 2014, 第 2 作者94: 90-101, http://dx.doi.org/10.1016/j.sigpro.2013.06.003.
[50] Feng Liu. Flexible Visual Cryptography Scheme Without Distortion and Its Application. Springer Transactions on Data Hiding and Multimedia Security. 2013, 第 1 作者
[51] Feng Liu. ESSVCS: An Enriched Secre Sharing Visual Cryptography. Springer Transactions on Data Hiding and Multimedia Security. 2013, 第 1 作者
[52] Teng Guo, Feng Liu, ChuanKun Wu. Threshold visual secret sharing by random grids with improved contrast. THE JOURNAL OF SYSTEMS & SOFTWARE. 2013, 第 2 作者86(8): 2094-2109, http://dx.doi.org/10.1016/j.jss.2013.03.062.
[53] Guo, Teng, Liu, Feng, Wu, ChuanKun. Threshold visual secret sharing by random grids with improved contrast. JOURNAL OF SYSTEMS AND SOFTWARE[J]. 2013, 第 2 作者86(8): 2094-2109, http://dx.doi.org/10.1016/j.jss.2013.03.062.
[54] 林东岱, 刘峰. 美国信息安全保密体系初探. 保密科学技术[J]. 2012, 第 2 作者6-13, http://lib.cqvip.com/Qikan/Article/Detail?id=1003479771.
[55] Feng Liu. Visual Cryptography for Natural Images and Visual Voting. Inscrypt2012. 2012, 第 1 作者
[56] Liu, Feng, Guo, Teng, Wu, ChuanKun, Qian, Lina. Improving the visual quality of size invariant visual cryptography scheme. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION[J]. 2012, 第 1 作者  通讯作者  23(2): 331-342, http://dx.doi.org/10.1016/j.jvcir.2011.11.003.
[57] 李鹏, 马培军, 苏小红, 刘峰. 多重门限的图像秘密共享方案. 电子学报[J]. 2012, 第 4 作者40(3): 518-524, http://lib.cqvip.com/Qikan/Article/Detail?id=41636936.
[58] Feng Liu. On the Equivalence of Two Definitions of Visual Cryptography Scheme. ISPEC 2012. 2012, 第 1 作者
[59] Liu, F, Wu, C, Lin, X. Cheating immune visual cryptography scheme. IET INFORMATION SECURITY[J]. 2011, 5(1): 51-59, https://www.webofscience.com/wos/woscc/full-record/WOS:000295122600007.
[60] Liu, Feng, Wu, Chuankun. Embedded Extended Visual Cryptography Schemes. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2011, 第 1 作者  通讯作者  6(2): 307-322, https://www.webofscience.com/wos/woscc/full-record/WOS:000290737100006.
[61] Ching-Nung Yang, Chih-Cheng Wu, Feng Liu. Construction of General (k, n) Probabilistic Visual Cryptography Scheme. 电子科技学刊:英文版[J]. 2011, 第 3 作者9(4): 317-324, http://lib.cqvip.com/Qikan/Article/Detail?id=40735635.
[62] Liu, Feng, Wu, Chuankun, Lin, Xijun. Step Construction of Visual Cryptography Schemes. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2010, 第 1 作者  通讯作者  5(1): 27-38, https://www.webofscience.com/wos/woscc/full-record/WOS:000274737400003.
[63] Liu, Feng, Wu, ChuanKun, Lin, XiJun. A new definition of the contrast of visual cryptography scheme. INFORMATION PROCESSING LETTERS[J]. 2010, 第 1 作者  通讯作者  110(7): 241-246, https://www.webofscience.com/wos/woscc/full-record/WOS:000275923700001.
[64] Liu, Feng, Wu, ChuanKun, Lin, XiJun. Some Extensions on Threshold Visual Cryptography Schemes. COMPUTER JOURNAL[J]. 2010, 第 1 作者  通讯作者  53(1): 107-119, http://www.corc.org.cn/handle/1471x/2411929.
[65] Feng Liu. The Alignment Problem of the Visual Cryptography Scheme. Designs, codes and cryptography. 2009, 第 1 作者
发表著作
(1) 美国网络空间安全体系, Overview of the Cybersecurity System in USA, 科学出版社, 2015-01, 第 1 作者
(2) 视觉密码学理论、方法与应用, Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications (Second Edition), Springer-Verlag London, 2015-06, 第 1 作者
(3) Proceedings of 1st International Workshop on Science of Cybersecurity, Springer, 2018-08, 第 1 作者
(4) Proceedings of 2nd International Workshop on Science of Cybersecurity, Springer, 2019-11, 第 1 作者
(5) Proceedings of 3rd International Workshop on Science of Cybersecurity, Springer, 2021-10, 第 4 作者
(6) Proceedings of 4th International Workshop on Science of Cybersecurity, SciSec2022, Springer, 2022-10, 第 3 作者

专利与奖励

   
专利成果
[1] 张晓宇, 李文灏, 石海超, 刘峰. 基于流量指纹蒸馏的设备入网行为检测方法和系统. CN2024100787487, 2024-01-19.
[2] 张晓宇, 李文灏, 刘峰. 一种基于可解释人工智能的实时入侵检测方法及系统. CN: CN116318787B, 2023-11-07.
[3] 张晓宇, 李文灏, 刘峰. 一种基于可解释人工智能的实时入侵检测方法及系统. CN202211571092.X, 2022-12-08.
[4] 张晓宇, 李文灏, 刘峰. 基于对抗扰动的实时网络连接隐私保护方法和系统. CN202210622904.2, 2022-06-01.
[5] 张晓宇, 李文灏, 刘峰. 基于对抗扰动的实时网络连接隐私保护方法和系统. CN: CN115174147A, 2022-10-11.
[6] 张晓宇, 李文灏, 刘峰. 基于优化元学习的轻量恶意软件流量检测方法及装置. CN: CN115225310A, 2022-10-21.
[7] 张晓宇, 李文灏, 刘峰. 基于直推图的加密流量识别与分类方法及系统. CN: CN114866301B, 2023-05-02.
[8] 张晓宇, 李文灏, 刘峰. 基于直推图的加密流量识别与分类方法及系统. CN: CN114866301A, 2022-08-05.
[9] 张晓宇, 李文灏, 刘峰. 基于直推图的加密流量识别与分类方法及系统. CN202210440703.0, 2022-04-25.
[10] 张晓宇, 李文灏, 刘峰. 基于图匹配的不同网络环境的加密流量分类方法及系统. CN: CN114978593A, 2022-08-30.
[11] 张晓宇, 李文灏, 刘峰. 基于图匹配的不同网络环境的加密流量分类方法及系统. CN202210397693.7, 2022-04-15.
[12] 刘峰, 李琳, 汤子贤, 王强, 王文. 基于HTTP请求有效负载的漏洞攻击流量检测方法和系统. CN: CN114866279A, 2022-08-05.
[13] 刘峰, 李琳, 汤子贤, 王强, 王文. 基于HTTP请求有效负载的漏洞攻击流量检测方法和系统. CN: CN114866279B, 2023-07-25.
[14] 刘峰, 刘家志, 王文. 3D-2D同步显示方法及系统. CN: CN113014902A, 2021-06-22.
[15] 刘峰, 王文, 刘家志. 防偷窥的安全显示方法、具有欺伪效果的安全显示方法及安全显示系统. CN: CN107680543A, 2018-02-09.
[16] 刘峰, 郭腾. 一种基于视觉密码的隐私保护显示器实现方法. CN: CN104269150A, 2015-01-07.
[17] 张晓宇, 李文灏, 石海超, 刘峰. 基于流量指纹蒸馏的设备入网行为检测方法和系统. CN: CN117857201A, 2024-04-09.
[18] 刘峰, 鲍怀锋, 王文, 汤子贤. 基于协同注意力的恶意软件分类方法和装置. CN: CN116186702B, 2024-02-13.
[19] 张晓宇, 李文灏, 刘峰. 基于对抗扰动的实时网络连接隐私保护方法和系统. CN: CN115174147B, 2024-05-07.
[20] 张晓宇, 李文灏, 刘峰. 基于优化元学习的轻量恶意软件流量检测方法及装置. CN: CN115225310B, 2024-05-07.

科研活动

   
科研项目
( 1 ) 视觉密码方案的构造, 负责人, 国家任务, 2010-01--2012-12
( 2 ) 海云信息安全体系与共性技术研究, 参与, 中国科学院计划, 2012-01--2016-12
( 3 ) 针对视觉密码应用的若干关键问题研究, 参与, 研究所自选, 2013-01--2013-12
( 4 ) 中国科学院青年创新促进会, 负责人, 中国科学院计划, 2014-01--2017-12
( 5 ) 未来信息技术研究, 参与, 中国科学院计划, 2012-01--2016-12
( 6 ) 视觉安全若干关键问题研究, 负责人, 国家任务, 2017-01--2020-12
( 7 ) 网络威胁发现项目, 负责人, 地方任务, 2019-07--2020-12
( 8 ) 多源数据获取, 负责人, 中国科学院计划, 2019-01--2022-12
( 9 ) 某工程, 负责人, 其他任务, 2022-01--2023-12