General

Qixu Liu,  Ph.D

Professor,  Ph.D.Supervisor 

liuqixu@iie.ac.cn

Research Areas

Web Security, Malware Analysis, Vulnerability Detection, Threat Detection and Defenses, Cyber Deception

Education

2002.9-2006.7, University of Science and Technology of China(USTC), Information Security, B.S
2006.9-2011.5, University of Chinese Academy of Sciences(UCAS), Information Security, Ph.D 

Experience

2020.10-NowInstitute of Information Engineering,CAS, Professor

2015.10-2020.10, Institute of Information Engineering,CAS, Associate Professor

2013.09-2015.10, University of Chinese Academy of Sciences(UCAS), Lecturer

2011.06-2013.09, University of Chinese Academy of Sciences(UCAS), Postdoctor

Publications

DBLP: Qixu Liu

[1]. Haoqiang Wang, Yiwei Fang, Yichen Liu, Ze Jin, Emma Delph, Xiaojiang Du,  Qixu Liu*, Luyi Xing*.  Hidden and Lost Control: on Security Design Risks in IoT User-Facing Matter Controller. the 32nd edition of the Network and Distributed System Security Symposium (NDSS 2025).  San Diego, California. February 24-28, 2025.

[2]. Xinyu Liu, Ze Jin, Jiaxi Liu, Wei Liu, Xiaoxi Wang, Qixu Liu*.  ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications. the 39th Applied Computer Security Applications Conference (ACSAC 2023), Austin, Texas, USA. December 4-8, 2023.

[3]. Xingchen Chen, Baizhu Wang, Ze Jin, Yun Feng, Xianglong Li, Xincheng Feng, Qixu Liu*Tabby: Automated Gadget Chain Detection for Java Deserialization Vulnerabilities. The 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network (DSN 2023). Porto, Portugal, June 27-30, 2023.

[4]. Haozhen Zhang, Le Yu, Xi Xiao, Qing Li, Francesco Mercaldo, Xiapu Luo and Qixu LiuTFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification. The Web Conference 2023 (WWW 2023). AUSTIN, TEXAS, USA. APRIL 30 - MAY 4, 2023. 

[5]. Ze Jin, Luyi Xing*, Yiwei Fang, Yan Jia, Bin Yuan, Qixu Liu*. P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies. The 29th ACM Conference on Computer and Communications Security (ACM CCS 2022). Los Angeles, USA. November 7-11, 2022

[6]. Junnan Wang,  Qixu Liu*, Di Wu, Ying Dong and Xiang Cui. Crafting Adversarial Example to Bypass Flow-&ML-based Botnet Detector via RL, The 24th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2021), Donostia / San Sebastian, Spain on October 6-8, 2021

[7]. Zhejun FangQixu Liu, et.al. A Static Technique For Detecting Input Validation Vulnerability in Android Apps. SCIENCE CHINA Information Sciences.60(5): 052111:1-052111:16. 2017

[8]. Qianru Wu, Qixu Liu, Yuqing Zhang, Pen Liu and Guanxing Wen. A Machine Learning Approach for Detecting Third-Party Trackers on the Web. 21st European Symposium on Research in Computer Security(ESORICS 2016), Greece, Heraklion, 26 - 30 September 2016

[9. Qianru Wu, Qixu Liu, Yuqing Zhang and Guanxing Wen. TrackerDetector:a System to Detect Third-Party Trackers through Machine Learning. Computer Networks - Elsevier. Volume 91, Pages 164-173, November 14, 2015.

[10]. Yuqing Zhang, Qixu Liu, Qihan Luo, Xaili Wang. XAS: cross-API scripting attacks in social ecosystems. SCIENCE CHINA Information Sciences. 58(1): 012101(14), 2015.

[11]. Guanxing Wen, Yuqing Zhang, Qixu Liu, Dingning Yang, Fuzzing the ActionScript Virtual Machine. 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Hangzhou, China, full paper, 2013.5

[12]. Qixu Liu, Yuqing Zhang, Ying Kong, Qianru Wu. Improving VRSS-based vulnerability prioritization using analytic hierarchy process. Journal of Systems and Software - Elsevier, 85(8): pages: 1699-1708, 2012.8