default search action
Chaoge Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j4]Zhi Wang, Chaoge Liu, Xiang Cui, Jie Yin, Xutong Wang:
EvilModel 2.0: Bringing Neural Network Models into Malware Attacks. Comput. Secur. 120: 102807 (2022) - [j3]Kun Jia, Chaoge Liu, Qixu Liu, Junnan Wang, Jiazhi Liu, Feng Liu:
A lightweight DDoS detection scheme under SDN context. Cybersecur. 5(1) (2022) - [c23]Xutong Wang, Chaoge Liu, Xiaohui Hu, Zhi Wang, Jie Yin, Xiang Cui:
Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks. ACSAC 2022: 267-278 - [c22]Zhi Wang, Chaoge Liu, Xiang Cui, Jie Yin, Jiaxi Liu, Di Wu, Qixu Liu:
DeepC2: AI-Powered Covert Command and Control on OSNs. ICICS 2022: 394-414 - [c21]Jingqiang Liu, Xiaoxi Zhu, Chaoge Liu, Xiang Cui, Qixu Liu:
CPGBERT: An Effective Model for Defect Detection by Learning Program Semantics via Code Property Graph. TrustCom 2022: 274-282 - 2021
- [c20]Junnan Wang, Qixu Liu, Chaoge Liu, Jie Yin:
GAN-Based Adversarial Patch for Malware C2 Traffic to Bypass DL Detector. ICICS (1) 2021: 78-96 - [c19]Zhi Wang, Chaoge Liu, Xiang Cui:
EvilModel: Hiding Malware Inside of Neural Network Models. ISCC 2021: 1-7 - [c18]Yun Feng, Baoxu Liu, Yue Zhang, Jinli Zhang, Chaoge Liu, Qixu Liu:
Automated Honey Document Generation Using Genetic Algorithm. WASA (3) 2021: 20-28 - [i3]Zhi Wang, Chaoge Liu, Xiang Cui:
EvilModel: Hiding Malware Inside of Neural Network Models. CoRR abs/2107.08590 (2021) - [i2]Zhi Wang, Chaoge Liu, Xiang Cui, Jie Yin:
EvilModel 2.0: Hiding Malware Inside of Neural Network Models. CoRR abs/2109.04344 (2021) - 2020
- [c17]Fangjiao Zhang, Xiang Cui, Zhi Wang, Shaomian Chen, Qixu Liu, Chaoge Liu:
A Systematic Study of AI Applications in Cybersecurity Competitions. BigDataSE 2020: 138-146 - [c16]Jie Yin, Xiang Cui, Chaoge Liu, Qixu Liu, Tao Cui, Zhi Wang:
CoinBot: A Covert Botnet in the Cryptocurrency Network. ICICS 2020: 107-125 - [i1]Zhi Wang, Chaoge Liu, Xiang Cui, Jialong Zhang, Di Wu, Jie Yin, Jiaxi Liu, Qixu Liu, Jinli Zhang:
AI-powered Covert Botnet Command and Control on OSNs. CoRR abs/2009.07707 (2020)
2010 – 2019
- 2019
- [j2]Wei Jiang, Xianda Wu, Xiang Cui, Chaoge Liu:
A Highly Efficient Remote Access Trojan Detection Method. Int. J. Digit. Crime Forensics 11(4): 1-13 (2019) - 2018
- [j1]Zihan Wang, Chaoge Liu, Jing Qiu, Zhihong Tian, Xiang Cui, Shen Su:
Automatically Traceback RDP-Based Targeted Ransomware Attacks. Wirel. Commun. Mob. Comput. 2018: 7943586:1-7943586:13 (2018) - [c15]Zhaopeng Jia, Xiang Cui, Qixu Liu, Xiaoxi Wang, Chaoge Liu:
Micro-Honeypot: Using Browser Fingerprinting to Track Attackers. DSC 2018: 197-204 - [c14]Xiaoyun Li, Xiang Cui, Limin Shi, Chaoge Liu, Xiaoxi Wang:
Constructing Browser Fingerprint Tracking Chain Based on LSTM Model. DSC 2018: 213-218 - [c13]Chaoge Liu, Xiang Cui, Zhi Wang, Xiaoxi Wang, Yun Feng, Xiaoyun Li:
MaliceScript: A Novel Browser-Based Intranet Threat. DSC 2018: 219-226 - [c12]Zihan Wang, Xu Wu, Chaoge Liu, Qixu Liu, Jialai Zhang:
RansomTracer: Exploiting Cyber Deception for Ransomware Tracing. DSC 2018: 227-234 - [c11]Ke Li, Rongliang Chen, Liang Gu, Chaoge Liu, Jie Yin:
A Method Based on Statistical Characteristics for Detection Malware Requests in Network Traffic. DSC 2018: 527-532 - [c10]Yun Feng, Baoxu Liu, Xiang Cui, Chaoge Liu, Xuebin Kang, Junwei Su:
A Systematic Method on PDF Privacy Leakage Issues. TrustCom/BigDataSE 2018: 1020-1029 - 2014
- [c9]Dong Li, Fangjiao Zhang, Chaoge Liu:
POSTER: Abusing URL Shortening Services for Stealthy and Resilient Message Transmitting. CCS 2014: 1451-1453 - [c8]Ke Li, Chaoge Liu, Xiang Cui:
POSTER: A Lightweight Unknown HTTP Botnets Detecting and Characterizing System. CCS 2014: 1454-1456 - [c7]Ke Liu, Shuai Lu, Chaoge Liu:
POSTER: Fingerprinting the Publicly Available Sandboxes. CCS 2014: 1469-1471 - 2013
- [c6]Dan Li, Chaoge Liu, Xu Cui, Xiang Cui:
Sniffing and propagating malwares through WPAD deception in LANs. CCS 2013: 1437-1440 - [c5]Xiang Cui, Binxing Fang, Jinqiao Shi, Chaoge Liu:
Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets. SecureComm 2013: 53-68 - 2012
- [c4]Xiang Cui, Binxing Fang, Peng Liao, Chaoge Liu:
Advanced triple-channel botnets: model and implementation. CCS 2012: 1019-1021 - [c3]Xiang Cui, Jinqiao Shi, Peng Liao, Chaoge Liu:
The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract). RAID 2012: 376-377 - 2011
- [c2]Peng Liao, Xiang Cui, Shuhao Li, Chaoge Liu:
Poster: recoverable botnets: a hybrid C&C approach. CCS 2011: 833-836 - [c1]Chaoge Liu, Weiqing Lu, Zhiqi Zhang, Peng Liao, Xiang Cui:
A recoverable hybrid C&C botnet. MALWARE 2011: 110-118
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 21:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint