基本信息

刘峰  男  博导  中国科学院信息工程研究所
电子邮件: liufeng-AT-iie.ac.cn
通信地址: 北京市海淀区闵庄路甲89号

研究领域

信息安全体系与战略,网络攻防演化理论,视觉安全理论与技术
Strategic and economic aspects of information security, Network Attack and Defense throey, visual security and cryptography

招生信息

   
招生方向
信息对抗理论与技术,信息安全战略研究,密码学

教育背景

2003-09--2009-01   软件研究所   博士
1999-09--2003-07   山东大学   学士

出版信息

   
发表论文
[1] Feng Liu. HSLF: HTTP Header Sequence based LSH fingerprints for Application Traffic Classification. ICCS 2021. 2021, [2] Feng Liu. Mining Trojan Detection Based on Multi-dimensional Static Features. SciSec 2021. 2021, [3] 刘峰. 基于网络空间欺骗的移动目标防御技术研究. 信息安全学报. 2021, [4] Duohe Ma. What You See Is Not What You Get: Towards Deception-Based Data Moving Target Defense. IEEE International Performance Computing and Communications Conference. 2020, [5] 刘峰. SiCsFuzzer:基于稀疏插桩的闭源软件模糊测试方法. 信息安全学报. 2020, [6] Feng Liu. WGT: Thwarting Web Attacks Through Web Gene Tree-based Moving Target Defense. IEEE International Conference on Web Services. 2020, [7] Yan, Dingyu, Liu, Feng, Jia, Kun, IEEE. Modeling an Information-based Advanced Persistent Threat Attack on the Internal Network. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2019, [8] Yan, Dingyu, Liu, Feng, IEEE Comp Soc. A Heuristic Method for Network Modification against Cyber Epidemic Attacks. 2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019)null. 2019, 184-191, [9] Yan, Dingyu, Liu, Feng, Zhang, Yaqin, Jia, Kun. Dynamical model for individual defence against cyber epidemic attacks. IET INFORMATION SECURITY[J]. 2019, 13(6): 541-551, http://dx.doi.org/10.1049/iet-ifs.2018.5147.
[10] Xu, Yuwei, Liu, Feng, Wu, Chuankun. Preimage Distributions of Perfect Nonlinear Functions and Vectorial Plateaued Functions. CHINESE JOURNAL OF ELECTRONICS[J]. 2019, 28(5): 933-937, http://lib.cqvip.com/Qikan/Article/Detail?id=7002864930.
[11] Xu, Tao, Liu, Feng, Wu, Chuankun. A white-box AES-like implementation based on key-dependent substitution-linear transformations. MULTIMEDIA TOOLS AND APPLICATIONS[J]. 2018, 77(14): 18117-18137, https://www.webofscience.com/wos/woscc/full-record/WOS:000440050900030.
[12] Shen, Gang, Liu, Feng, Fu, Zhengxin, Yu, Bin. Visual cryptograms of random grids via linear algebra. MULTIMEDIA TOOLS AND APPLICATIONS[J]. 2018, 77(10): 12871-12899, https://www.webofscience.com/wos/woscc/full-record/WOS:000433202100054.
[13] Feng Liu. Characterizing the Optimal Attack Strategy Decision in Cyber Epidemic Attacks with Limited Resources. 1st International Conference on Science of Cyber Security. 2018, [14] Xu, Tao, Wu, Chuankun, Liu, Feng, Zhao, Ruoxin. Protecting white-box cryptographic implementations with obfuscated round boundaries. SCIENCE CHINA-INFORMATION SCIENCESnull. 2018, 61(3): https://www.webofscience.com/wos/woscc/full-record/WOS:000417486900009.
[15] Ren, Yawei, Liu, Feng, Guo, Teng, Feng, Rongquan, Lin, Dongdai. Cheating prevention visual cryptography scheme using Latin square. IET INFORMATION SECURITY[J]. 2017, 11(4): 211-219, https://www.webofscience.com/wos/woscc/full-record/WOS:000404112600006.
[16] Shen, Gang, Liu, Feng, Fu, Zhengxin, Yu, Bin. New insight into linear algebraic technique to construct visual cryptography scheme for general access structure. MULTIMEDIA TOOLS AND APPLICATIONS[J]. 2017, 76(12): 14511-14533, https://www.webofscience.com/wos/woscc/full-record/WOS:000402732800036.
[17] Shen, Gang, Liu, Feng, Fu, Zhengxin, Yu, Bin. Perfect contrast XOR-based visual cryptography schemes via linear algebra. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2017, 85(1): 15-37, https://www.webofscience.com/wos/woscc/full-record/WOS:000408721500002.
[18] Chen, Huashan, Zhao, Xiuyan, Liu, Feng, Xu, Shouhuai, Lu, Wenlian. Optimizing interconnections to maximize the spectral radius of interdependent networks. PHYSICAL REVIEW E[J]. 2017, 95(3): 032308-1-032308-15, https://www.webofscience.com/wos/woscc/full-record/WOS:000396039200012.
[19] Yin, Jiaxin, Wang, Rui, Guo, Yuanfang, Liu, Feng, Shi, YQ, Kim, HJ, PerezGonzalez, F, Liu, F. An Adaptive Reversible Data Hiding Scheme for JPEG Images. DIGITAL FORENSICS AND WATERMARKING, IWDW 2016null. 2017, 10082: 456-469, [20] Wang Wen, Liu Feng, Guo Teng, Ren Yawei, Kraetzer C, Shi YQ, Dittmann J, Kim HJ. Temporal Integration Based Visual Cryptography Scheme and Its Application. DIGITAL FORENSICS AND WATERMARKINGnull. 2017, 10431: 406-419, [21] Ren, Yawei, Liu, Feng, Wang, Wen, Shi, YQ, Kim, HJ, PerezGonzalez, F, Liu, F. Collusive Attacks to Partition Authentication Visual Cryptography Scheme. DIGITAL FORENSICS AND WATERMARKING, IWDW 2016null. 2017, 10082: 238-250, [22] Shen, Gang, Liu, Feng, Fu, Zhengxin, Yu, Bin, Wang, Wen, Shi, YQ, Kim, HJ, PerezGonzalez, F, Liu, F. Halftone Visual Cryptography with Complementary Cover Images. DIGITAL FORENSICS AND WATERMARKING, IWDW 2016null. 2017, 10082: 223-237, [23] Feng Liu. Information Security Display Technology with Cheating Effect. 15th International Workshop on Digital-forensics and Watermarking. 2017, [24] Xu, Yuwei, Li, Yongqiang, Wu, Chuankun, Liu, Feng. On the construction of differentially 4-uniform involutions. FINITE FIELDS AND THEIR APPLICATIONS[J]. 2017, 47: 309-329, https://www.webofscience.com/wos/woscc/full-record/WOS:000407407500019.
[25] Guo, Teng, Liu, Feng, Wang, Wen, Yu, BingTao, Shi, YQ, Kim, HJ, PerezGonzalez, F, Liu, F. Privacy Monitor. DIGITAL FORENSICS AND WATERMARKING, IWDW 2016null. 2017, 10082: 187-197, [26] Wang, Guangyu, Liu, Feng, Yan, Wei Qi. 2D Barcodes for visual cryptography. MULTIMEDIA TOOLS AND APPLICATIONS[J]. 2016, 75(2): 1223-1241, [27] Dongdai Lin. The Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity. ISPEC 2016. 2016, [28] Dongdai Lin. The Linear Complexity and 2-Error Linear Complexity Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed Hamming Weight. ICICS 2016. 2016, [29] Wang Guangyu, Liu Feng. Basic Visual Cryptography Using Braille. International Journal of Digital Crime and Forensics (IJDCF)[J]. 2016, [30] Feng Liu. Event Analogy Based Privacy Preservation in Visual Surveillance. PSIVT 2015. 2015, [31] []. Enhanced Color Visual Cryptography using Halftoning Schemes. AENSI. 2015, http://oa.las.ac.cn/oainone/service/browseall/read1?ptype=JA&workid=JA201902180266790ZK.
[32] Feng Liu. A New Construction of Tagged Visual Cryptography Scheme. IWDW2015. 2015, [33] Feng Liu. An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion. IWDW2015. 2015, [34] Teng Guo, Feng Liu, ChuanKun Wu, YaWei Ren, Wen Wang. On (k, n) Visual Cryptography Scheme with t Essential Parties. INFORMATION THEORETIC SECURITY, ICITS 2013null. 2014, 8317: 56-68, [35] 赵倩, 刘峰, 林东岱. 美国网络空间安全教育战略计划. 中国信息安全. 2014, 91-94, http://lib.cqvip.com/Qikan/Article/Detail?id=661884058.
[36] Guo, Teng, Liu, Feng, Wu, ChuanKun. k out of k extended visual cryptography scheme by random grids. SIGNAL PROCESSING[J]. 2014, 94: 90-101, http://dx.doi.org/10.1016/j.sigpro.2013.06.003.
[37] Feng Liu. Flexible Visual Cryptography Scheme Without Distortion and Its Application. Springer Transactions on Data Hiding and Multimedia Security. 2013, [38] Feng Liu. ESSVCS: An Enriched Secre Sharing Visual Cryptography. Springer Transactions on Data Hiding and Multimedia Security. 2013, [39] Teng Guo, Feng Liu, ChuanKun Wu. Threshold visual secret sharing by random grids with improved contrast. The Journal of Systems & Software. 2013, 86(8): 2094-2109, http://dx.doi.org/10.1016/j.jss.2013.03.062.
[40] Guo, Teng, Liu, Feng, Wu, ChuanKun. Threshold visual secret sharing by random grids with improved contrast. JOURNAL OF SYSTEMS AND SOFTWARE[J]. 2013, 86(8): 2094-2109, http://dx.doi.org/10.1016/j.jss.2013.03.062.
[41] 林东岱, 刘峰. 美国信息安全保密体系初探. 保密科学技术. 2012, 6-13, http://lib.cqvip.com/Qikan/Article/Detail?id=1003479771.
[42] Feng Liu. Visual Cryptography for Natural Images and Visual Voting. Inscrypt2012. 2012, [43] Liu, Feng, Guo, Teng, Wu, ChuanKun, Qian, Lina. Improving the visual quality of size invariant visual cryptography scheme. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION[J]. 2012, 23(2): 331-342, http://dx.doi.org/10.1016/j.jvcir.2011.11.003.
[44] 李鹏, 马培军, 苏小红, 刘峰. 多重门限的图像秘密共享方案. 电子学报[J]. 2012, 40(3): 518-524, http://lib.cqvip.com/Qikan/Article/Detail?id=41636936.
[45] Feng Liu. On the Equivalence of Two Definitions of Visual Cryptography Scheme. ISPEC 2012. 2012, [46] Liu, F, Wu, C, Lin, X. Cheating immune visual cryptography scheme. IET INFORMATION SECURITY[J]. 2011, 5(1): 51-59, https://www.webofscience.com/wos/woscc/full-record/WOS:000295122600007.
[47] Liu, Feng, Wu, Chuankun. Embedded Extended Visual Cryptography Schemes. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2011, 6(2): 307-322, https://www.webofscience.com/wos/woscc/full-record/WOS:000290737100006.
[48] Ching-Nung Yang, Chih-Cheng Wu, Feng Liu. Construction of General (k, n) Probabilistic Visual Cryptography Scheme. 电子科技学刊:英文版. 2011, 9(4): 317-324, http://lib.cqvip.com/Qikan/Article/Detail?id=40735635.
[49] Liu, Feng, Wu, Chuankun, Lin, Xijun. Step Construction of Visual Cryptography Schemes. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2010, 5(1): 27-38, https://www.webofscience.com/wos/woscc/full-record/WOS:000274737400003.
[50] Liu, Feng, Wu, ChuanKun, Lin, XiJun. A new definition of the contrast of visual cryptography scheme. INFORMATION PROCESSING LETTERS[J]. 2010, 110(7): 241-246, https://www.webofscience.com/wos/woscc/full-record/WOS:000275923700001.
[51] Liu, Feng, Wu, ChuanKun, Lin, XiJun. Some Extensions on Threshold Visual Cryptography Schemes. COMPUTER JOURNAL[J]. 2010, 53(1): 107-119, http://www.corc.org.cn/handle/1471x/2411929.
[52] Feng Liu. The Alignment Problem of the Visual Cryptography Scheme. Designs, codes and cryptography. 2009, 
发表著作
(1) 美国网络空间安全体系, Overview of the Cybersecurity System in USA, 科学出版社, 2015-01, 第 1 作者
(2) 视觉密码学理论、方法与应用, Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications (Second Edition), Springer-Verlag London, 2015-06, 第 1 作者
(3) Proceedings of 1st International Workshop on Science of Cybersecurity, Springer, 2018-08, 第 1 作者
(4) Proceedings of 2nd International Workshop on Science of Cybersecurity, Springer, 2019-11, 第 1 作者

专利与奖励

   
专利成果
( 1 ) 一种安全协议的形式化分析方法, 发明, 2010, 第 2 作者, 专利号: 201010578947.2
( 2 ) 一种基于视觉密码的隐私保护显示器实现方法, 发明, 2016, 第 1 作者, 专利号: 201410542752.0
( 3 ) 一种基于视觉密码的可视防复印技术, 发明, 2012, 第 1 作者, 专利号: 201210075522.9
( 4 ) 防偷窥的安全显示方法、具有欺伪效果的安全显示方法及安全显示系统, 发明, 2020, 第 1 作者, 专利号: 2017107899619

科研活动

   
科研项目
( 1 ) 视觉密码方案的构造, 主持, 国家级, 2010-01--2012-12
( 2 ) 海云信息安全体系与共性技术研究, 参与, 部委级, 2012-01--2016-12
( 3 ) 针对视觉密码应用的若干关键问题研究, 参与, 市地级, 2013-01--2013-12
( 4 ) 中国科学院青年创新促进会, 主持, 部委级, 2014-01--2017-12
( 5 ) 未来信息技术研究, 参与, 部委级, 2012-01--2016-12
( 6 ) 视觉安全若干关键问题研究, 主持, 国家级, 2017-01--2020-12
( 7 ) 多源QB获取, 主持, 部委级, 2018-09--2018-12
( 8 ) 网络威胁发现与溯源支撑系统研发, 主持, 省级, 2019-07--2020-12
( 9 ) 多源数据获取, 主持, 部委级, 2019-01--2022-12