基本信息
刘峰 男 博导 中国科学院信息工程研究所
电子邮件: liufeng-AT-iie.ac.cn
通信地址: 北京市海淀区树村路19号
个人主页:https://fengliu.net.cn
研究领域
网络攻防对抗理论与技术,网络空间安全战略
招生信息
招生专业
083900-网络空间安全
招生方向
信息对抗理论与技术,信息安全战略研究,密码学
教育背景
2003-09--2009-01 软件研究所 博士1999-09--2003-07 山东大学 学士
教授课程
网络空间安全战略
出版信息
发表论文
(1) Online/offline and History Indexing Identity-based Fuzzy Message Detection, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 第 2 作者(2) High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree, MILCOM 2022, 2022, 第 6 作者(3) Optimal Strategy Selection for Attack Graph Games Using Deep Reinforcement Learning, HPCC2022, 2022, 第 2 作者(4) Robust Stereo Matching with an Unfixed and Adaptive Disparity Search Range, ICPR 2022, 2022, 第 2 作者(5) SiCsFuzzer:基于稀疏插桩的闭源软件模糊测试方法, SiCsFuzzer:A Sparse-instrumentation-based Fuzzing Platform for Closed Source Software, 信息安全学报, 2022, 第 6 作者(6) Optimal Strategy Selection for Cyber Deception via Deep Reinforcement Learning, IEEE UIC 2022 (The 2022 IEEE International Conference on Ubiquitous Intelligence and Computing, 15-18 December, Haikou China), 2022, 第 2 作者(7) A novel stereo matching pipeline with robustness and unfixed disparity search range, IEEE ICME 2022, 2022, 第 2 作者(8) Modified 2D-Ghost-Free Stereoscopic Display with Depth-of-Field Effects, ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), 2022, 第 2 作者(9) Hybrid Routing for Efficient Fine-Grained Management of Specific Services in SDN, SciSec 2022, 2022, 第 2 作者(10) HSLF: HTTP Header Sequence based LSH fingerprints for Application Traffic Classification, ICCS 2021, 2021, 第 2 作者(11) Mining Trojan Detection Based on Multi-dimensional Static Features, SciSec 2021, 2021, 第 2 作者(12) 基于网络空间欺骗的移动目标防御技术研究, 信息安全学报, 2021, 第 1 作者(13) SDN环境下的DDoS检测与缓解机制, DDoS detection and mitigation Framework in SDN, 信息安全学报, 2021, 第 3 作者(14) SDN环境下的DDoS检测与缓解机制, DDoS detection and mitigation Framework in SDN, 信息安全学报, 2021, 第 3 作者(15) What You See Is Not What You Get: Towards Deception-Based Data Moving Target Defense, IEEE International Performance Computing and Communications Conference, 2020, (16) SiCsFuzzer:基于稀疏插桩的闭源软件模糊测试方法, 信息安全学报, 2020, 第 1 作者(17) WGT: Thwarting Web Attacks Through Web Gene Tree-based Moving Target Defense, IEEE International Conference on Web Services, 2020, 第 1 作者(18) Modeling an Information-based Advanced Persistent Threat Attack on the Internal Network, ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019, 第 2 作者(19) A Heuristic Method for Network Modification against Cyber Epidemic Attacks, 2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, 第 2 作者(20) Dynamical model for individual defence against cyber epidemic attacks, IET INFORMATION SECURITY, 2019, 第 2 作者(21) Preimage Distributions of Perfect Nonlinear Functions and Vectorial Plateaued Functions, Preimage Distributions of Perfect Nonlinear Functions and Vectorial Plateaued Functions, CHINESE JOURNAL OF ELECTRONICS, 2019, 第 2 作者(22) A white-box AES-like implementation based on key-dependent substitution-linear transformations, MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 第 2 作者 通讯作者(23) Visual cryptograms of random grids via linear algebra, MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 第 2 作者(24) Characterizing the Optimal Attack Strategy Decision in Cyber Epidemic Attacks with Limited Resources, 1st International Conference on Science of Cyber Security, 2018, 第 1 作者(25) Protecting white-box cryptographic implementations with obfuscated round boundaries, SCIENCE CHINA-INFORMATION SCIENCES, 2018, 第 3 作者 通讯作者(26) Cheating prevention visual cryptography scheme using Latin square, IET INFORMATION SECURITY, 2017, 第 2 作者(27) New insight into linear algebraic technique to construct visual cryptography scheme for general access structure, MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 第 2 作者(28) Perfect contrast XOR-based visual cryptography schemes via linear algebra, DESIGNS CODES AND CRYPTOGRAPHY, 2017, 第 2 作者(29) Optimizing interconnections to maximize the spectral radius of interdependent networks, PHYSICAL REVIEW E, 2017, 第 3 作者 通讯作者(30) An Adaptive Reversible Data Hiding Scheme for JPEG Images, DIGITAL FORENSICS AND WATERMARKING, IWDW 2016, 2017, 第 4 作者(31) Collusive Attacks to Partition Authentication Visual Cryptography Scheme, DIGITAL FORENSICS AND WATERMARKING, IWDW 2016, 2017, 第 2 作者(32) Temporal Integration Based Visual Cryptography Scheme and Its Application, DIGITAL FORENSICS AND WATERMARKING, 2017, 第 2 作者(33) Halftone Visual Cryptography with Complementary Cover Images, DIGITAL FORENSICS AND WATERMARKING, IWDW 2016, 2017, 第 2 作者(34) Information Security Display Technology with Cheating Effect, 15th International Workshop on Digital-forensics and Watermarking, 2017, 第 1 作者(35) On the construction of differentially 4-uniform involutions, FINITE FIELDS AND THEIR APPLICATIONS, 2017, 第 4 作者(36) Privacy Monitor, DIGITAL FORENSICS AND WATERMARKING, IWDW 2016, 2017, 第 2 作者(37) 2D Barcodes for visual cryptography, MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 第 2 作者(38) The Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity, ISPEC 2016, 2016, (39) The Linear Complexity and 2-Error Linear Complexity Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed Hamming Weight, ICICS 2016, 2016, (40) Basic Visual Cryptography Using Braille, INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS (IJDCF), 2016, 第 2 作者(41) Event Analogy Based Privacy Preservation in Visual Surveillance, PSIVT 2015, 2015, 第 1 作者(42) Enhanced Color Visual Cryptography using Halftoning Schemes, AENSI, 2015, (43) A New Construction of Tagged Visual Cryptography Scheme, IWDW2015, 2015, 第 1 作者(44) An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion, IWDW2015, 2015, 第 1 作者(45) On (k, n) Visual Cryptography Scheme with t Essential Parties, INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 第 2 作者(46) 美国网络空间安全教育战略计划, 中国信息安全, 2014, 第 2 作者(47) k out of k extended visual cryptography scheme by random grids, SIGNAL PROCESSING, 2014, 第 2 作者(48) Flexible Visual Cryptography Scheme Without Distortion and Its Application, Springer Transactions on Data Hiding and Multimedia Security, 2013, 第 1 作者(49) ESSVCS: An Enriched Secre Sharing Visual Cryptography, Springer Transactions on Data Hiding and Multimedia Security, 2013, 第 1 作者(50) Threshold visual secret sharing by random grids with improved contrast, THE JOURNAL OF SYSTEMS & SOFTWARE, 2013, 第 2 作者(51) Threshold visual secret sharing by random grids with improved contrast, JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 第 2 作者(52) 美国信息安全保密体系初探, 保密科学技术, 2012, 第 2 作者(53) Visual Cryptography for Natural Images and Visual Voting, Inscrypt2012, 2012, 第 1 作者(54) Improving the visual quality of size invariant visual cryptography scheme, JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2012, 第 1 作者 通讯作者(55) 多重门限的图像秘密共享方案, Multi-Threshold Image Secret Sharing Scheme, 电子学报, 2012, 第 4 作者(56) On the Equivalence of Two Definitions of Visual Cryptography Scheme, ISPEC 2012, 2012, 第 1 作者(57) Cheating immune visual cryptography scheme, IET INFORMATION SECURITY, 2011, (58) Embedded extended visual cryptography schemes, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 第 1 作者 通讯作者(59) Construction of General (k, n) Probabilistic Visual Cryptography Scheme, Construction of General (k, n) Probabilistic Visual Cryptography Scheme, 电子科技学刊:英文版, 2011, 第 3 作者(60) Step construction of visual cryptography schemes, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 第 1 作者 通讯作者(61) A new definition of the contrast of visual cryptography scheme, INFORMATION PROCESSING LETTERS, 2010, 第 1 作者 通讯作者(62) Some extensions on threshold visual cryptography schemes, COMPUTER JOURNAL, 2010, 第 1 作者 通讯作者(63) The Alignment Problem of the Visual Cryptography Scheme, Designs, codes and cryptography, 2009, 第 1 作者
发表著作
(1) 美国网络空间安全体系, Overview of the Cybersecurity System in USA, 科学出版社, 2015-01, 第 1 作者(2) 视觉密码学理论、方法与应用, Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications (Second Edition), Springer-Verlag London, 2015-06, 第 1 作者(3) Proceedings of 1st International Workshop on Science of Cybersecurity, Springer, 2018-08, 第 1 作者(4) Proceedings of 2nd International Workshop on Science of Cybersecurity, Springer, 2019-11, 第 1 作者(5) Proceedings of 3rd International Workshop on Science of Cybersecurity, Springer, 2021-10, 第 4 作者(6) Proceedings of 4th International Workshop on Science of Cybersecurity, SciSec2022, Springer, 2022-10, 第 3 作者
专利与奖励
专利成果
( 1 ) 基于流量指纹蒸馏的设备入网行为检测方法和系统, 发明专利, 2024, 第 4 作者, 专利号: CN2024100787487( 2 ) 一种基于可解释人工智能的实时入侵检测方法及系统, 发明授权, 2023, 第 3 作者, 专利号: CN116318787B( 3 ) 一种基于可解释人工智能的实时入侵检测方法及系统, 发明专利, 2022, 第 3 作者, 专利号: CN202211571092.X( 4 ) 基于对抗扰动的实时网络连接隐私保护方法和系统, 发明专利, 2022, 第 3 作者, 专利号: CN202210622904.2( 5 ) 基于对抗扰动的实时网络连接隐私保护方法和系统, 发明专利, 2022, 第 3 作者, 专利号: CN115174147A( 6 ) 基于优化元学习的轻量恶意软件流量检测方法及装置, 发明专利, 2022, 第 3 作者, 专利号: CN115225310A( 7 ) 基于直推图的加密流量识别与分类方法及系统, 发明授权, 2023, 第 3 作者, 专利号: CN114866301B( 8 ) 基于直推图的加密流量识别与分类方法及系统, 发明专利, 2022, 第 3 作者, 专利号: CN114866301A( 9 ) 基于直推图的加密流量识别与分类方法及系统, 发明专利, 2022, 第 3 作者, 专利号: CN202210440703.0( 10 ) 基于图匹配的不同网络环境的加密流量分类方法及系统, 发明专利, 2022, 第 3 作者, 专利号: CN114978593A( 11 ) 基于图匹配的不同网络环境的加密流量分类方法及系统, 发明专利, 2022, 第 3 作者, 专利号: CN202210397693.7( 12 ) 基于HTTP请求有效负载的漏洞攻击流量检测方法和系统, 发明专利, 2022, 第 1 作者, 专利号: CN114866279A( 13 ) 基于HTTP请求有效负载的漏洞攻击流量检测方法和系统, 发明授权, 2023, 第 1 作者, 专利号: CN114866279B( 14 ) 3D-2D同步显示方法及系统, 发明专利, 2021, 第 1 作者, 专利号: CN113014902A( 15 ) 防偷窥的安全显示方法、具有欺伪效果的安全显示方法及安全显示系统, 专利授权, 2018, 第 1 作者, 专利号: CN107680543A( 16 ) 一种基于视觉密码的隐私保护显示器实现方法, 发明专利, 2015, 第 1 作者, 专利号: CN104269150A
科研活动
科研项目
( 1 ) 视觉密码方案的构造, 负责人, 国家任务, 2010-01--2012-12( 2 ) 海云信息安全体系与共性技术研究, 参与, 中国科学院计划, 2012-01--2016-12( 3 ) 针对视觉密码应用的若干关键问题研究, 参与, 研究所自选, 2013-01--2013-12( 4 ) 中国科学院青年创新促进会, 负责人, 中国科学院计划, 2014-01--2017-12( 5 ) 未来信息技术研究, 参与, 中国科学院计划, 2012-01--2016-12( 6 ) 视觉安全若干关键问题研究, 负责人, 国家任务, 2017-01--2020-12( 7 ) 网络威胁发现项目, 负责人, 地方任务, 2019-07--2020-12( 8 ) 多源数据获取, 负责人, 中国科学院计划, 2019-01--2022-12( 9 ) 某工程, 负责人, 其他任务, 2022-01--2023-12