发表论文
[1] Jianjun Zhao, Can Yang, Di Wu, Yaqin Cao, Yuling Liu, Xiang Cui, Qixu Liu. Detecting compromised email accounts via login behavior characterization. CYBERSECURITY. 2024, 第 5 作者7(1): 16-36, http://lib.cqvip.com/Qikan/Article/Detail?id=7111457774.[2] Xiao, Haitao, Zhu, Yan, Zhang, Bin, Lu, Zhigang, Du, Dan, Liu, Yuling. Unveiling shadows: A comprehensive framework for insider threat detection based on statistical and sequential analysis. COMPUTERS & SECURITY[J]. 2024, 第 6 作者138: http://dx.doi.org/10.1016/j.cose.2023.103665.[3] Chen, Yufan, Yang, Jiahai, Cui, Susu, Dong, Cong, Jiang, Bo, Liu, Yuling, Lu, Zhigang. Unveiling encrypted traffic types through hierarchical network characteristics. COMPUTERS & SECURITY[J]. 2024, 第 6 作者138: http://dx.doi.org/10.1016/j.cose.2023.103645.[4] Boyuan Xu, Yiru Gong, Xiaoyu Geng, Yun Li, Cong Dong, Song Liu, Yuling Liu, Bo Jiang, Zhigang Lu. ProcSAGE: an efficient host threat detection method based on graph representation learning. CYBERSECURITY[J]. 2024, 第 7 作者7(1): 1-14, http://dx.doi.org/10.1186/s42400-024-00240-w.[5] 马向亮, 乌力吉, 王宏, 张向民, 黄克振, 刘玉岭. 一种基于模板的RSA-CRT模约减攻击方法. 电子学报[J]. 2024, 第 6 作者52(3): 689-695, http://lib.cqvip.com/Qikan/Article/Detail?id=7111996042.[6] 刘奇旭, 肖聚鑫, 谭耀康, 王承淳, 黄昊, 张方娇, 尹捷, 刘玉岭. 工业互联网流量分析技术综述. 通信学报[J]. 2024, 第 8 作者null(null): [7] 蹇诗婕, 刘岳, 姜波, 卢志刚, 刘玉岭, 刘宝旭. 基于聚类过采样和自动编码器的网络入侵检测方法. 信息安全学报[J]. 2023, 第 5 作者8(6): 121-134, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=7611766&detailType=1.[8] Chuyi Yan, Chen Zhang, Meng Shen, Ning Li, Jinhao Liu, Yinhao Qi, Zhigang Lu, Yuling Liu. Aparecium: understanding and detecting scam behaviors on Ethereum via biased random walk. CYBERSECURITY[J]. 2023, 第 8 作者6(1): 1-16, http://dx.doi.org/10.1186/s42400-023-00180-x.[9] Zhaoshan Fan, Qing Wang, Haoran Jiao, Junrong Liu, Zelin Cui, Song Liu, Yuling Liu. PUMD:a PU learning-based malicious domain detection framework. 网络空间安全科学与技术(英文)[J]. 2023, 第 7 作者6(1): 90-111, http://lib.cqvip.com/Qikan/Article/Detail?id=7109341331.[10] Wang, Qing, Dong, Cong, Jian, Shijie, Du, Dan, Lu, Zhigang, Qi, Yinhao, Han, Dongxu, Ma, Xiaobo, Wang, Fei, Liu, Yuling. HANDOM: Heterogeneous Attention Network Model for Malicious Domain Detection. COMPUTERS & SECURITY[J]. 2023, 第 10 作者 通讯作者 125: http://dx.doi.org/10.1016/j.cose.2022.103059.[11] Jianjun Zhao, Can Yang, Di Wu, Yaqin Cao, Yuling Liu, Xiang Cui, Qixu Liu. Detecting compromised email accounts via login behavior characterization. CYBERSECURITY[J]. 2023, 第 5 作者6(1): 1-21, http://dx.doi.org/10.1186/s42400-023-00167-8.[12] Dong, Cong, Yang, Jiahai, Liu, Song, Wang, Zhi, Liu, Yuling, Lu, Zhigang. C-BEDIM and S-BEDIM: Lateral movement detection in enterprise network through behavior deviation measurement. COMPUTERS & SECURITY[J]. 2023, 第 5 作者130: http://dx.doi.org/10.1016/j.cose.2023.103267.[13] Haitao Xiao, Chen Zhang, Song Liu, Bo Jiang, Zhigang Lu, Fei Wang, Yuling Liu. CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network. Security and Privacy in Communication Networks: 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings. 2023, 第 7 作者 通讯作者 https://link.springer.com/chapter/10.1007/978-3-031-25538-0_4.[14] 崔苏苏, 董聪, 沈蒙, 刘玉岭, 姜波, 卢志刚. CBSeq: A Channel-Level Behavior Sequence for Encrypted Malware Traffic Detection. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2023, 第 4 作者18(2023): 5011-5025, https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10198353.[15] Ma Xiangliang, Zhang Lizhen, Wu Liji, Li Xia, Zhang Xiangmin, Li Bing, Liu Yuling. Differential Fault Analysis on 3DES Middle Rounds Based on Error Propagation. CHINESE JOURNAL OF ELECTRONICS[J]. 2022, 第 7 作者31(1): 68-78, https://www.doi.org/10.1049/cje.2021.00.117.[16] Dongxu Han, Pu Dong, Ning Li, Xiang Cui, Jiawen Diao, Qing Wang, Dan Du, Yuling Liu. DCC-Find: DNS Covert Channel Detection by Features Concatenation-Based LSTM. 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 2022, 第 8 作者 通讯作者 https://ieeexplore.ieee.org/abstract/document/10063732/.[17] Haitao Xiao, Yuling Liu, Dan Du, Zhigang Lu. An Approach for Predicting the Costs of Forwarding Contracts using Gradient Boosting. 2022 17th Conference on Computer Science and Intelligence Systems (FedCSIS). 2022, 第 2 作者 通讯作者 https://ieeexplore.ieee.org/abstract/document/9908920/authors#authors.[18] Chuyi Yan, Chen Zhang, Zhigang Lu, Zehui Wang, Yuling Liu, Baoxu Liu. Blockchain abnormal behavior awareness methods: a survey. CYBERSECURITY[J]. 2022, 第 5 作者5(1): 1-27, http://dx.doi.org/10.1186/s42400-021-00107-4.[19] Haoran Jiao, Qing Wang, Zhaoshan Fan, Junrong Liu, Dan Du, Ning Li, Yuling Liu. DGGCN: Dictionary based DGA detection method based on DomainGraph and GCN. 2022 International Conference on Computer Communications and Networks (ICCCN). 2022, 第 7 作者 通讯作者 [20] 董聪, Chen YF, zhang yj, 刘玉岭, 卢志刚, Dong P, 刘宝旭. BEDIM : Lateral Movement Detection In Enterprise Network Through Behavior Deviation Measurement. HPCC. 2022, 第 4 作者[21] 樊昭杉, 王青, 刘俊荣, 崔泽林, 刘玉岭, 刘松. 域名滥用行为检测技术综述. 计算机研究与发展[J]. 2022, 第 5 作者59(11): 2581-2605, http://lib.cqvip.com/Qikan/Article/Detail?id=7108329383.[22] Chuyi Yan, Chen Zhang, Zhigang Lu, Zehui Wang, Yuling Liu, Baoxu Liu. Blockchain abnormal behavior awareness methods: a survey. 网络空间安全科学与技术(英文). 2022, 第 5 作者5(2): 92-118, http://lib.cqvip.com/Qikan/Article/Detail?id=7107732567.[23] Xu, Xiaoyu, Hu, Hao, Liu, Yuling, Tan, Jinglei, Zhang, Hongqi, Song, Haotian. Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack. DIGITAL COMMUNICATIONS AND NETWORKS[J]. 2022, 第 3 作者8(3): 373-387, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=7258807&detailType=1.[24] Zhaoshan Fan, Qing Wang, Haoran Jiao, Junrong Liu, Zelin Cui, Song Liu, Yuling Liu. PUMD: a PU learning-based malicious domain detection framework. CYBERSECURITY[J]. 2022, 第 7 作者5(1): 1-22, https://doaj.org/article/13384b530d054686bd730d4492a706d7.[25] 徐潇雨, 胡浩, 张红旗, 刘玉岭. 基于深度确定性策略梯度的随机路由防御方法. 通信学报[J]. 2021, 第 4 作者42(6): 41-51, http://lib.cqvip.com/Qikan/Article/Detail?id=7105012434.[26] Xu, Xiaoyu, Hu, Hao, Liu, Yuling, Zhang, Hongqi, Chang, Dexian. An Adaptive IP Hopping Approach for Moving Target Defense Using a Light-Weight CNN Detector. SECURITY AND COMMUNICATION NETWORKS[J]. 2021, 第 3 作者2021: http://dx.doi.org/10.1155/2021/8848473.[27] Haitao Xiao, Yuling Liu, Dan Du, Zhigang Lu. Wp-gbdt: An approach for winner prediction using gradient boosting decision tree. 2021 IEEE International Conference on Big Data (Big Data). 2021, 第 2 作者 通讯作者 [28] 陈妍, 朱燕, 刘玉岭, 刘星材. 网络安全态势感知标准架构设计. 信息安全研究[J]. 2021, 第 3 作者7(9): 844-848, http://lib.cqvip.com/Qikan/Article/Detail?id=7105363398.[29] 凌玥, 刘玉岭, 姜波, 李宁, 卢志刚, 刘宝旭. 基于双层异质集成学习器的入侵检测方法. 信息安全学报[J]. 2021, 第 2 作者6(3): 16-28, [30] Lu Zhigang. STIDM: A Spatial and Temporal Aware Intrusion Detection Model. Trustcom. 2020, [31] Hu, Hao, Liu, Yuling, Chen, Chen, Zhang, Hongqi, Liu, Yi. Optimal Decision Making Approach for Cyber Security Defense Using Evolutionary Game. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT[J]. 2020, 第 2 作者 通讯作者 17(3): 1683-1700, http://dx.doi.org/10.1109/TNSM.2020.2995713.[32] Valeria V Krzhizhanovskaya, Gbor Zvodszky, Michael H Lees, Jack J Dongarra, Peter M A Sloot, Srgio Brissos, Joo Teixeira, Bo Jiang, Zhigang Lu, Yuling Liu, Ning Li, Zelin Cui. Social Recommendation in Heterogeneous Evolving Relation Network. COMPUTATIONAL SCIENCE – ICCS 2020. 2020, 第 10 作者12137: 554-567, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7302249/.[33] 黄克振, 连一峰, 冯登国, 张海霞, 刘玉岭, 马向亮. 基于区块链的网络安全威胁情报共享模型. 计算机研究与发展[J]. 2020, 第 5 作者57(4): 836-846, https://kns.cnki.net/KCMS/detail/detail.aspx?dbcode=CJFQ&dbname=CJFDLAST2020&filename=JFYZ202004014&v=MTU4MDZZUzdEaDFUM3FUcldNMUZyQ1VSN3FlWitSdkZpbm1VTHJJTHl2U2RMRzRITkhNcTQ5RVlJUjhlWDFMdXg=.[34] Hu, Hao, Liu, Jing, Zhang, Yuchen, Liu, Yuling, Xu, Xiaoyu, Tan, Jinglei. Attack scenario reconstruction approach using attack graph and alert data mining. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS[J]. 2020, 第 4 作者54: http://dx.doi.org/10.1016/j.jisa.2020.102522.[35] 韩瑶鹏, 卢志刚, 姜波, 刘玉岭, 张辰, 姜政伟, 李宁. MTLAT A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER. 15th Annual IFIP International Conference on Network and Parallel Computing(NPC 2018). 2020, 第 4 作者https://link.springer.com/chapter/10.1007/978-3-030-79478-1_4.[36] Zhang Yingjun, Liao Peng, Huang Kezhen, Liu Yuling, Jakobczak DJ, Bhardwaj M, Chin CS. An Automatic Approach for Scoring Vulnerabilities in Risk Assessment. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL AND ELECTRONIC ENGINEERING (EEE 2019). 2019, 第 4 作者185: 256-261, [37] 刘玉岭, 唐云善, 张琦, 李枫. 电力调度自动化软件安全态势评估方法. 信息网络安全[J]. 2019, 第 1 作者15-21, http://lib.cqvip.com/Qikan/Article/Detail?id=7002801356.[38] Hu, Hao, Shen, Gang, Liu, Yuling, Fu, Zhengxin, Yu, Bin. Improved schemes for visual secret sharing based on random grids. MULTIMEDIA TOOLS AND APPLICATIONS[J]. 2019, 第 3 作者78(9): 12055-12082, http://dx.doi.org/10.1007/s11042-018-6738-2.[39] 胡浩, 刘玉岭, 张玉臣, 张红旗. 基于攻击图的网络安全度量研究综述. 网络与信息安全学报[J]. 2018, 第 2 作者4(9): 1-16, http://lib.cqvip.com/Qikan/Article/Detail?id=676291416.[40] Shen Wuqiang, Liu Ye, Wu Qinqin, Tian Yiqing, Liu Yuling, Peng Huaxi, IEEE. Application of Dynamic Security Technology Architecture for Advanced Directional Attacks in Power System Information Security. 2018 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON). 2018, 第 5 作者3042-3047, [41] Hu, Hao, Liu, Yuling, Zhang, Hongqi, Pan, Ruixuan. Optimal Network Defense Strategy Selection Based on Incomplete Information Evolutionary Game. IEEE ACCESS[J]. 2018, 第 2 作者 通讯作者 6: 29806-29821, https://doaj.org/article/f6a958533c404f1fa016c5f2ebdd06dd.[42] 胡浩, 刘玉岭, 张红旗, 杨英杰, 叶润国. 基于吸收Markov链的网络入侵路径预测方法. 计算机研究与发展[J]. 2018, 第 2 作者55(4): 831-845, https://crad.ict.ac.cn/cn/article/doi/10.7544/issn1000-1239.2018.20170087.[43] 胡浩, 叶润国, 张红旗, 常德显, 刘玉岭, 杨英杰. 面向漏洞生命周期的安全风险度量方法. 软件学报[J]. 2018, 第 5 作者29(5): 1213-1229, http://lib.cqvip.com/Qikan/Article/Detail?id=675240623.[44] Hu, Hao, Liu, Yuling, Yang, Yingjie, Zhang, Hongqi, Zhang, Yuchen. New Insights into Approaches to Evaluating Intention and Path for Network Multistep Attacks. MATHEMATICAL PROBLEMS IN ENGINEERING[J]. 2018, 第 2 作者 通讯作者 2018: https://doaj.org/article/7f3f9f6da0be46a7b3c00bffd3a78dba.[45] Hu, Hao, Liu, Yuling, Zhang, Hongqi, Zhang, Yuchen. Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis. SECURITY AND COMMUNICATION NETWORKS[J]. 2018, 第 2 作者 通讯作者 https://doaj.org/article/955f0984661248e5ba593c751f889874.[46] 刘玉岭. ������������������������������������������. 第六届全国网络安全等级保护技术大会. 2017, 第 1 作者[47] 胡浩, 叶润国, 张红旗, 杨英杰, 刘玉岭. 基于攻击预测的网络安全态势量化方法. 通信学报[J]. 2017, 第 5 作者38(10): 2017204-1, http://lib.cqvip.com/Qikan/Article/Detail?id=673621291.[48] Hu, Hao, Zhang, Hongqi, Liu, Yuling, Wang, Yongwei. Quantitative Method for Network Security Situation Based on Attack Prediction. SECURITY AND COMMUNICATION NETWORKS[J]. 2017, 第 3 作者https://doaj.org/article/e363bce12cd74594b7c4d9472b93131e.[49] 贾雪飞, 刘玉岭, 严妍, 吴迪. ���������������������������������������������������������������. 计算机应用研究[J]. 2016, 第 2 作者33(6): 1775-1779, http://lib.cqvip.com/Qikan/Article/Detail?id=669025619.[50] Zhang Yingjun, Chen Kai, Liu Yuling, Lian Yifeng, Xie B, Xu X. A Lattice-based Access Control Model for Social Networks. 2016 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY PROCEEDINGS - CYBERC 2016. 2016, 第 3 作者54-61, http://dx.doi.org/10.1109/CyberC.2016.19.[51] 刘玉岭. ������������������������������������������������������. 第四届信息安全等级保护技术大会. 2015, 第 1 作者[52] 黄亮, 冯登国, 连一峰, 陈恺, 张颖君, 刘玉岭. 一种基于多属性决策的DDoS防护措施遴选方法. 软件学报[J]. 2015, 第 6 作者26(7): 1742-1756, http://lib.cqvip.com/Qikan/Article/Detail?id=665259382.[53] 连一峰. A Game Theory Based Approach to the Generation of Optimal DDoS Defending Strategy. ComSec. 2014, [54] 布宁, 刘玉岭, 连一峰, 黄亮. 一种基于UML的网络安全体系建模分析方法. 计算机研究与发展[J]. 2014, 第 2 作者51(7): 1578-1593, http://lib.cqvip.com/Qikan/Article/Detail?id=50300278.[55] 刘玉岭, 冯登国, 连一峰, 陈恺, 吴迪. 基于时空维度分析的网络安全态势预测方法. 计算机研究与发展[J]. 2014, 第 1 作者51(8): 1681-1694, http://lib.cqvip.com/Qikan/Article/Detail?id=661863760.[56] Liu Yuling, Feng Dengguo, Lian Yifeng, Chen Kai, Zhang Yingjun. Optimal defense strategies for DDoS defender using Bayesian game model. 9th International Conference on Information Security Practice and Experience, ISPEC 2013. 2013, 第 1 作者44-59, http://ir.iscas.ac.cn/handle/311060/16677.[57] 连一峰, 冯登国, 吴丽辉, 连一峰. 基于静态贝叶斯博弈的蠕虫攻防策略绩效评估. 软件学报[J]. 2012, 23(3): 712-723, [58] 吴迪, 连一峰, 陈恺, 刘玉岭. 一种基于攻击图的安全威胁识别和分析方法. 计算机学报[J]. 2012, 第 4 作者35(9): 1938-1950, http://lib.cqvip.com/Qikan/Article/Detail?id=43376015.[59] Chuyi Yan, Xueying Han, Yan Zhu, Dan Du, Zhigang Lu, Yuling Liu. Phishing behavior detection on different blockchains via adversarial domain adaptation. CYBERSECURITY. 第 6 作者7(1): http://dx.doi.org/10.1186/s42400-024-00237-5.[60] Chunwen Liu, Ru Tan, Yang Wu, Yun Feng, Ze Jin, Fangjiao Zhang, Yuling Liu, Qixu Liu. Dissecting zero trust: research landscape and its implementation in IoT. CYBERSECURITY. 第 7 作者7(1): http://dx.doi.org/10.1186/s42400-024-00212-0.