基本信息
刘峰  男  博导  中国科学院信息工程研究所
电子邮件: liufeng@iie.ac.cn
通信地址: 北京市海淀树村路19号
邮政编码:

研究领域

网络攻防对抗理论与技术,人工智能赋能网络空间安全,网络高级威胁发现溯源,密码学

工作经历

工作简历:

2014-10--现在 中国科学院信息工程研究所   研究员

2012-01--2014-09   中国科学院信息工程研究所   副研究员

2011-07--2011-12   软件研究所   副研究员

2009-01--2011-06   软件研究所   助理研究员


学术兼职:

2019-01-现在,《国际数字犯罪与取证》(IJDCF), 主编

2018-01-现在,网络空间安全国际学术会议(SciSec: https://scisec.org)发起人

出版信息

部分论著:




  • Feng Liu and Weiqi Yan. Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications . Springer-Verlag London, 2014.
  • Feng Liu etc. Overview of the Cybersecurity System in USA. Science Press, 2015. 刘峰等著,《美国网络空间安全体系》,科学出版社,2015。
  • Chunhua Su, Kouichi Sakurai, Feng Liu. Proceedings of 4th International Workshop on Science of Cybersecurity, SciSec2022, Matsue, Japan, August 10–12, 2022.Lecture Notes in Computer Science (LNCS, volume 13580)
  • Wenlian Lu, Kun Sun, Moti Yung, Feng Liu. Proceedings of 3rd International Workshop on Science of Cybersecurity, SciSec2021, Shanghai, China, August 13-15, 2021.Lecture Notes in Computer Science (LNCS, volume 13005)
  • Feng Liu, Jia Xu, Shouhuai Xu, Moti Yung. Proceedings of 2st International Workshop on Science of Cybersecurity, SciSec2019, Nanjing, China, August 9-11, 2019. Lecture Notes in Computer Science (LNCS, volume 11933)
  • Feng Liu, Shouhuai Xu, Moti Yung. Proceedings of 1st International Workshop on Science of Cybersecurity, SciSec2018, Beijing, China, August 12-14, 2018. Lecture Notes in Computer Science (LNCS, volume 11287)


部分论文:




  • Jingcheng Ju, Zirui Liu, Kaicheng Yang, Yikai Zhao, Tong Yang, Feng Liu, Guodong Yang, Xingchun Wang and Duohe Ma. "Mirror Asymmetry Perfect Hashing: A Memory-Efficient and Load-Intensive-Optimized Hashing Index on Hybrid DRAM-PMem Architecture" ICDE 2026-42nd IEEE International Conference on Data Engineering (ICDE) Montréal, Canada - May 4-8, 2026.(CCF-A)
  • Huashan Chen, Yifan Xu, Yue Feng, Ming Jian, Feng Liu, Pengfei Hu, Kebin Peng, Sen He and Zi Wang. "DynamicLip: Shape-Independent Continuous Authentication via Lip Articulator Dynamics." IEEE Transactions on Mobile Computing, 2025. (CCF-A)
  • Faqi Zhao, Wenhao Li, Huaifeng Bao, Zhaoxuan Li, Guoqiao Zhou, Wen Wang and Feng Liu. "Nüwa: Enhancing Network Traffic Analysis With Pre-Trained Side-Channel Feature Imputation." IEEE Transactions on Networking, 2025.(CCF-A)
  • Huashan Chen, Zisheng Huang, Yifan Xu, Wenjie Huang, Xuheng Wang, Jinfu Chen, Haotang Li, Kebin Peng, Feng Liu and Sen He. "Unveiling code clone patterns in open source VR software: an empirical study." Automated Software Engineering 32.2, 2025: 72.(CCF-B)
  • Lijia Lv, Weigang Zhang, Xuehai Tang, Jie Wen, Feng Liu and Jizhong Han. "Adappa: Adaptive position pre-fill jailbreak attack approach targeting llms." ICASSP 2025-2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2025.(CCF-B)
  • Faqi Zhao, Duohe Ma, Wenhao Li, Feng Liu and Wen Wang. "Poster: Enhancing Network Traffic Analysis with Pre-trained Side-channel Feature Imputation." Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security. 2024.(CCF-A)
  • Huaifeng Bao, Wenhao Li, Zhaoxuan Li, Han Miao, Wen Wang and Feng Liu. "Poster: PGPNet: Classify APT Malware Using Prediction-Guided Prototype Network." Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security. 2024.(CCF-A)
  • Huaifeng Bao, Wenhao Li, Huashan Chen, Han Miao, Qiang Wang, Zixian Tang, Feng Liu and Wen Wang. "Stories behind decisions: Towards interpretable malware family classification with hierarchical attention." Computers & Security 144, 2024: 103943.(CCF-B)
  • Liu, Jiazhi, and Feng Liu. "Modified 2D-Ghost-Free Stereoscopic Display with Depth-of-Field Effects." ACM Transactions on Multimedia Computing, Communications and Applications 19.1s, 2023: 1-16.(CCF-B)
  • Jiazhi Liu and Feng Liu "A novel stereo matching pipeline with robustness and unfixed disparity search range ". Accepted by ICME 2022 (IEEE International Conference on Multimedia and Expo 2022 , 11-15 July,  Taipei, China), 2022.(CCF-B)
  • Yaqin Zhang, Duohe Ma, Xiaoyan Sun, Kai Chen, Feng Liu "WGT: Thwarting Web Attacks Through Web Gene Tree-based Moving Target Defense". Accepted by ICWS 2020 (IEEE International Conference on Web Services, October 19-23, Beijing, China), 2020.(CCF-B)
  • Dingyu Yan, Feng Liu, Yaqin Zhang and Kun Jia "Dynamical model for individual defence against cyber epidemic attacks", IET Information Security, volume 13, issue 6, pages 541-551, 2019.(CCF-C, CACR-B)
  • Tao Xu, Chuankun Wu, Feng Liu and Ruoxin Zhao "Protecting White-Box Cryptographic Implementations with Obfuscated Round Boundaries", SCIENCE CHINA Information Sciences, volume 61, issue 3, pages 237-239, 2018.(CCF-A)
  • Gang Shen, Feng Liu, Zhengxin Fu and Bi-n Yu "Perfect Contrast XOR-based Visual Cryptography Schemes via Linear Algebra", Designs, Codes and Cryptography, volume 85, issue 1, pages 15-37, 2017. (CCF-B)
  • Yawei Ren, Feng Liu etc. "Cheating prevention visual cryptography scheme using Latin square" IET Information Security, volume 11 issue 4, page 211-219, 2017.(CCF-C, CACR-B)
  • Teng Guo, Feng Liu and Chuankun Wu. k out of k extended visual cryptography scheme by random grids. Signal Processing(Elsevier), volume 94, pages 90–101, January 2014.(CCF-C)
  • Teng Guo, Feng Liu and Chuankun Wu. Threshold visual secret sharing by random grids with improved contrast. Journal of Systems and Software, volume 86, issue 8, pages 2094–2109, 2013.(CCF-B)
  • Feng Liu, Teng Guo and Chuankun Wu and Lina Qian. Improving the Visual Quality of Size Invariant Visual Cryptography Scheme. Journal of Visual Communication and Image Representation, volume 23, pages 331-342, 2012.(CCF-C)
  • Feng Liu and Chuankun Wu. Embedded Extended Visual Cryptography Schemes. IEEE Transactions on Information Forensics & Security, volume 6, No. 2, pages 307-322, 2011, also available at ePrint Archive 2010/439.(CCF-A)
  • Feng Liu, Chuankun Wu and Xijun Lin. Cheating Immune Visual Cryptography Scheme. IET Information Security, volume 5, issue 1, pages 51-59, 2011.(CCF-C, CACR-B)
  • Feng Liu, Chuankun Wu and Xijun Lin. Step Construction of Visual Cryptography Schemes. IEEE Transactions on Information Forensics & Security, volume 5, No. 1, pages 27-38, 2010.(CCF-A)
  • Feng Liu, Chuankun Wu and Xijun Lin. Some Extensions on Threshold Visual Cryptography Schemes. The Computer Journal, volume 53, issue 1, pages 107-119, 2010.(CCF-B)
  • Feng Liu, Chuankun Wu and Xijun Lin. A New Definition of the Contrast of Visual Cryptography Scheme. Information Processing Letters, volume 110, pages 241-246, 2010.(CCF-C, CACR-B)
  • Feng Liu and Chuankun Wu. A Robust Visual Cryptography Based Watermarking Scheme for Multiple Cover Images and Multiple Owners. IET Information Security, volume 5, issue 2, pages 121–128, 2010.(CCF-C, CACR-B)
  • Feng Liu, Chuankun Wu and Xijun Lin. The Alignment Problem of the Visual Cryptography Scheme. Designs, codes and cryptography, volume 50, issue 2, pages 215-227, 2009.(CCF-B, CACR-B)
  • Feng Liu, Chuankun Wu and Xijun Lin. Colour Visual Cryptography Schemes. IET Information Security Volume 2, issue 4, pages 151-165, 2008.(CCF-C, CACR-B)

专利与奖励

  • “A vulnerability load classification method and system based on code and semantic features” with No. CN119442229A. 一种基于代码和语义特征的漏洞负载分类方法及系统, 2025.
  • “Side channel feature completion and detection methods for encrypted traffic” with No. CN118631517A. 加密流量的侧信道特征补全方法和检测方法, 2024.
  • “Real-time network connection privacy protection method and system based on anti disturbance” with No. CN115174147B. 基于对抗扰动的实时网络连接隐私保护方法和系统, 2024.
  • “A method and device for lightweight malware traffic detection based on optimized meta learning” with No. CN115225310B. 基于优化元学习的轻量恶意软件流量检测方法及装置, 2024.
  • “A method and system for device access behavior detection based on traffic fingerprint distillation” with No. CN117857201A. 基于流量指纹蒸馏的设备入网行为检测方法和系统, 2024.
  • “A method and device for malware classification based on collaborative attention” with No. CN116186702B. 基于协同注意力的恶意软件分类方法和装置, 2024.
  • “A method and system for device access behavior detection based on traffic fingerprint distillation” with No. CN2024100787487. 基于流量指纹蒸馏的设备入网行为检测方法和系统, 2024.
  • “A real-time intrusion detection method and system based on explainable artificial intelligence” with No. CN116318787B. 一种基于可解释人工智能的实时入侵检测方法及系统, 2023.
  • “Vulnerability attack traffic detection method and system based on HTTP request payload” with No. CN114866279B. 基于HTTP请求有效负载的漏洞攻击流量检测方法和系统, 2023.
  • “A method and system for identifying and classifying encrypted traffic based on direct push graph” with No. CN114866301B. 基于直推图的加密流量识别与分类方法及系统, 2023.
  • “A real-time intrusion detection method and system based on explainable artificial intelligence” with No. CN202211571092.X. 一种基于可解释人工智能的实时入侵检测方法及系统, 2022.
  • “A method and device for lightweight malware traffic detection based on optimized meta learning” with No. CN115225310A. 基于优化元学习的轻量恶意软件流量检测方法及装置, 2022.
  • “Real-time network connection privacy protection method and system based on anti disturbance” with No. CN115174147A. 基于对抗扰动的实时网络连接隐私保护方法和系统, 2022.
  • “Classification method and system of encrypted traffic in different network environments based on graph matching” with No. CN114978593A. 基于图匹配的不同网络环境的加密流量分类方法及系统, 2022.
  • “A method and system for identifying and classifying encrypted traffic based on direct push graph” with No. CN114866301A. 基于直推图的加密流量识别与分类方法及系统, 2022.
  • “Vulnerability attack traffic detection method and system based on HTTP request payload” with No. CN114866279A. 基于HTTP请求有效负载的漏洞攻击流量检测方法和系统, 2022.
  • “Real-time network connection privacy protection method and system based on anti disturbance” with No. CN202210622904.2. 基于对抗扰动的实时网络连接隐私保护方法和系统, 2022.
  • “A method and system for identifying and classifying encrypted traffic based on direct push graph” with No. CN202210440703.0. 基于直推图的加密流量识别与分类方法及系统, 2022.
  • “Classification method and system of encrypted traffic in different network environments based on graph matching” with No. CN202210397693.7. 基于图匹配的不同网络环境的加密流量分类方法及系统, 2022.
  • “A 3D-2D synchronous display method and system” with No. CN113014902A. 3D-2D同步显示方法及系统, 2021.
  • “A method for secure display and the security display system with cheating prevention” with No. CN107680543A. 防偷窥的安全显示方法、具有欺伪效果的安全显示方法及安全显示系统, 2018.
  • “A method of constructing visual cryptography based privacy protecting display” with No. CN104269150A. 一种基于视觉密码的隐私保护显示器实现方法, 2015.