发表论文
[1] Zhang, Yu, Huo, Wei, Jian, Kunpeng, Shi, Ji, Liu, Longquan, Zou, Yanyan, Zhang, Chao, Liu, Baoxu. ESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities. CYBERSECURITY[J]. 2021, 4(1): http://dx.doi.org/10.1186/s42400-021-00091-9.[2] Hao, Xingran, Jiang, Zhengwei, Xiao, Qingsai, Wang, Qiuyun, Yao, Yepeng, Liu, Baoxu, Liu, Jian. Producing More with Less: A GAN-based Network Attack Detection Approach for Imbalanced Data. PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD)null. 2021, 384-390, [3] 刘学章, 黄庆佳, 谢静, 贾晓启, 刘宝旭. 面向Web安全防护的蜜罐技术研究. 保密科学技术. 2021, 28-33, http://lib.cqvip.com/Qikan/Article/Detail?id=7104463255.[4] Ding, Xiong, Liu, Baoxu, Jiang, Zhengwei, Wang, Qiuyun, Xin, Liling, Shen, W, Barthes, JP, Luo, J, Shi, Y, Zhang, J. Spear Phishing Emails Detection Based on Machine Learning. PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD)null. 2021, 354-359, [5] Gao, Xianwei, Hu, Changzhen, Shan, Chun, Liu, Baoxu, Niu, Zequn, Xie, Hui. Malware classification for the cloud via semi-supervised transfer learning. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS[J]. 2020, 55: http://dx.doi.org/10.1016/j.jisa.2020.102661.[6] 董聪, 姜波, 卢志刚, 刘宝旭, 李宁, 马平川, 姜政伟, 刘俊荣. 面向网络空间安全情报的知识图谱综述. 信息安全学报[J]. 2020, 5(5): 56-76, http://lib.cqvip.com/Qikan/Article/Detail?id=7103104855.[7] Chen, Liangchen, Gao, Shu, Liu, Baoxu, Lu, Zhigang, Jiang, Zhengwei. THS-IDPC: A three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection. JOURNAL OF SUPERCOMPUTING[J]. 2020, 76(9): 7489-7518, https://www.webofscience.com/wos/woscc/full-record/WOS:000544146500002.[8] Dong, Cong, Zhang, Chen, Lu, Zhigang, Liu, Baoxu, Jiang, Bo. CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification. COMPUTER NETWORKS[J]. 2020, 176: http://dx.doi.org/10.1016/j.comnet.2020.107258.[9] 蹇诗婕, 卢志刚, 杜丹, 姜波, 刘宝旭. 网络入侵检测技术综述. 信息安全学报[J]. 2020, 5(4): 96-122, http://lib.cqvip.com/Qikan/Article/Detail?id=7102488257.[10] 蹇诗婕, 卢志刚, 姜波, 刘玉岭, 刘宝旭. 基于层次聚类方法的流量异常检测. 信息安全研究. 2020, 6(6): 474-481, http://lib.cqvip.com/Qikan/Article/Detail?id=7101844396.[11] Chen, Liangchen, Gao, Shu, Liu, Baoxu, Lu, Zhigang, Jiang, Zhengwei. FEW-NNN: A Fuzzy Entropy Weighted Natural Nearest Neighbor Method for Flow-Based Network Traffic Attack Detection. CHINA COMMUNICATIONS[J]. 2020, 17(5): 151-167, http://lib.cqvip.com/Qikan/Article/Detail?id=7101861525.[12] 章秀, 刘宝旭, 龚晓锐, 于磊, 宋振宇. Explore-Exploit:一种模拟真实网络渗透场景的安全竞赛. 信息安全学报[J]. 2020, 5(4): 55-71, http://lib.cqvip.com/Qikan/Article/Detail?id=7102488255.[13] 陈良臣, 高曙, 刘宝旭, 陶明峰. 网络流量异常检测中的维数约简研究. 计算机工程[J]. 2020, 46(2): 11-20, http://lib.cqvip.com/Qikan/Article/Detail?id=7100855401.[14] 杨沛安, 刘宝旭, 杜翔宇. 面向攻击识别的威胁情报画像分析. 计算机工程[J]. 2020, 46(1): 136-143, http://lib.cqvip.com/Qikan/Article/Detail?id=7100867280.[15] Zhang, Yu, Huo, Wei, Jian, Kunpeng, Shi, Ji, Lu, Haoliang, Liu, Longquan, Wang, Chen, Sun, Dandan, Zhang, Chao, Liu, Baoxu, ACM. SRFuzzer: An Automatic Fuzzing Framework for Physical SOHO Router Devices to Discover Multi-Type Vulnerabilities. 35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA)null. 2019, 544-556, http://dx.doi.org/10.1145/3359789.3359826.[16] Yao, Yepeng, Su, Liya, Lu, Zhigang, Liu, Baoxu, IEEE Comp Soc. STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection. 2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019)null. 2019, 120-127, [17] Cheng Yexia, Du Yuejin, Peng Jin, Fu Jun, Liu Baoxu, Yun X, Wen W, Lang B, Yan H, Ding L, Li J, Zhou Y. Research on Identity Authentication Method Based on Negative Logic System. CYBER SECURITY, CNCERT 2018null. 2019, 970: 3-15, [18] Cheng Yexia, Du Yuejin, Peng Jin, Fu Jun, Liu Baoxu, Yun X, Wen W, Lang B, Yan H, Ding L, Li J, Zhou Y. Trusted Secure Accessing Protection Framework Based on Cloud-Channel-Device Cooperation. CYBER SECURITY, CNCERT 2018null. 2019, 970: 165-176, [19] 刘潮歌, 方滨兴, 刘宝旭, 崔翔, 刘奇旭. 定向网络攻击追踪溯源层次化模型研究. 信息安全学报[J]. 2019, 4(4): 1-18, http://lib.cqvip.com/Qikan/Article/Detail?id=7002765087.[20] Yao, Yepeng, Su, Liya, Zhang, Chen, Lu, Zhigang, Liu, Baoxu, Rodrigues, JMF, Cardoso, PJS, Monteiro, J, Lam, R, Krzhizhanovskaya, VV, Lees, MH, Dongarra, JJ, Sloot, PMA. Marrying Graph Kernel with Deep Neural Network: A Case Study for Network Anomaly Detection. COMPUTATIONAL SCIENCE - ICCS 2019, PT IInull. 2019, 11537: 102-115, [21] Su, Liya, Yao, Yepeng, Lu, Zhigang, Liu, Baoxu, IEEE Comp Soc. Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-based Network Attack Detection. 2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019)null. 2019, 312-318, [22] Dong, Cong, Chen, YuFan, Zhang, YunJian, Jiang, Bo, Han, DongXu, Liu, BaoXu, Baru, C, Huan, J, Khan, L, Hu, XH, Ak, R, Tian, Y, Barga, R, Zaniolo, C, Lee, K, Ye, YF. An Approach for Scale Suspicious Network Events Detection. 2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA)null. 2019, 5854-5863, [23] Li Qiang, Jiang Zhengwei, Yang Zeming, Liu Baoxu, Wang Xin, Zhang Yunan. A Quality Evaluation Method of Cyber Threat Intelligence in User Perspective. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE)null. 2018, 269-276, [24] Feng Yun, Liu Baoxu, Cui Xiang, Liu Chaoge, Kang Xuebin, Su Junwei, IEEE. A Systematic Method on PDF Privacy Leakage Issues. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE)null. 2018, 1020-1029, [25] 李川, 刘宝旭. ParaIntentFuzz:安卓应用漏洞的并行化模糊测试方法. 计算机工程与应用[J]. 2018, 54(4): 110-116, http://lib.cqvip.com/Qikan/Article/Detail?id=674442551.[26] 杨梅芳, 霍玮, 邹燕燕, 尹嘉伟, 刘宝旭, 龚晓锐, 贾晓启, 邹维. 可编程模糊测试技术. 软件学报[J]. 2018, 29(5): 1258-1274, http://lib.cqvip.com/Qikan/Article/Detail?id=675240626.[27] 霍玮, 戴戈, 史记, 龚晓锐, 贾晓启, 宋振宇, 刘宝旭, 邹维. 基于模式生成的浏览器模糊测试技术. 软件学报[J]. 2018, 29(5): 1275-1287, http://lib.cqvip.com/Qikan/Article/Detail?id=675240627.[28] 杨泽明, 李强, 刘俊荣, 刘宝旭. 面向攻击溯源的威胁情报共享利用研究. 信息安全研究. 2015, 1(1): 31-36, http://lib.cqvip.com/Qikan/Article/Detail?id=670055416.