


default search action
Qingyun Liu 0001
Person information
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
- affiliation: University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China
Other persons with the same name
- Qingyun Liu
- Qingyun Liu 0002
— Anhui University of Technology, School of Mechanical Engineering, Ma'anshan, China (and 1 more)
- Qingyun Liu 0003
— Google DeepMind, USA (and 1 more)
- Qingyun Liu 0004 — Beijing University of Aeronautics and Astronautics, Department of Automation, China
- Qingyun Liu 0005 — AT&T Services Inc., Austin, TX, USA
- Qingyun Liu 0006 — Zhejiang University, ZJU-UIUC Institute, China
- Qingyun Liu 0007 — Hengyang Normal University, College of Computer Science and Technology, Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, China
- Qingyun Liu 0008 — Shandong University of Technology, School of Civil and Architectural Engineering, Zibo, China
- Qingyun Liu 0009 — Harvard School of Public Health, Department of Immunology and Infectious Diseases, Boston, MA, USA (and 1 more)
- Qingyun Liu 0010 — University of Science and Technology of China, Medical Imaging Center, Hefei, China
- Qingyun Liu 0011 — Shenzhen Longgang E. N. T. Hospital, China
- Qingyun Liu 0012 — Fudan University, School of Data Science, Shanghai, China
- Qingyun Liu 0013 — Xi'an University of Science and Technology, College of Safety Science and Engineering, China
- Qingyun Liu 0014 — Nantong University, School of Artificial Intelligence and Computer Science, China
- Qingyun Liu 0015 — Hunan Normal University, Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing, Changsha, China
- Qingyun Liu 0016
— Information Engineering University, School of Institute of Geographical Spatial Information, Zhengzhou, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c112]Qiuwen Lu, Qingyun Liu:
A Timestamp-Based Pacing Method for Virtual Network Functions. CSCWD 2025: 243-248 - [c111]Hongfei Zhang, Jie Li, Zeyu Yang, Shu Li, Haizhang Zhu, Qingyun Liu:
P4M3: Preventing SYN Flood Attacks on IPv6 Networks in SDN Using P4. CSCWD 2025: 648-653 - [c110]Meijie Du, Lijuan Zheng, Chenyang Cui, Rong Yang, Qingyun Liu:
Anya: A Novel Video Identification Attack on Media Multiplexing. CSCWD 2025: 2017-2022 - [c109]Can Zhao, Qingfeng Zhang, Yefeng Qin, Xuebin Wang, Qingyun Liu, Jinqiao Shi:
Quadruplet Fingerprinting: Onion Website Fingerprinting Through Quadruplet Network. CSCWD 2025: 2563-2568 - [c108]Renjie Li, Zhou Zhou, Jiang Guo, Zhongyi Zhang, Qingyun Liu:
DygLM: Detecting Lateral Movement Threat via Continuous-time Dynamic Graph Learning. CSCWD 2025: 2575-2580 - [c107]Renjie Li, Zhou Zhou, Hao Miao, Fengyuan Shi, Qingyun Liu:
MalTAG: Encrypted Malware Traffic Detection Framework via Graph Based Flow Interaction Mining. DSN 2025: 470-482 - [c106]Hongwei Wu, Jin Pan, Rong Yang, Hong Zhang, Guang Shi, Zhuojun Jiang, Qingyun Liu:
GMMCL: Adaptive Concept Drift in Data Streams with Gaussian Mixture Models based on Contrastive Learning. ICASSP 2025: 1-5 - [c105]Bada Xin, Xin Wan, Zhuojun Jiang, Faqiang Liu, Su Chen, Rong Yang, Qingyun Liu:
COAST: Contrastive Learning with Augmented Spatio-Temporal Encoding for Next POI Recommendation. ICASSP 2025: 1-5 - [c104]Hongbo Xu, Chengxiang Si, Zhou Zhou, Chenxu Wang, Peishuai Sun, Qingyun Liu:
APTSniffer: Detecting APT Attack Traffic Using Retrieval-Augmented Large Language Models. ICASSP 2025: 1-5 - [c103]Xiaoou Zhang, Yang Gao, Yang Liu, Yujia Zhu, Chuan Zhou, Peng Zhang, Yong Ding, Qingyun Liu, Hongyang Chen:
Node-Centric Meta Structure Search in Heterogeneous Graphs. ICASSP 2025: 1-5 - [c102]Taiyao Zhang
, Xingyu Fu
, Yuxin Zhang, Qingyun Liu:
MoHGNN: Enhanced Heterogeneous Graph Neural Network via Metapath Optimization. ICASSP 2025: 1-5 - [c101]Taiyao Zhang
, Dongzheng Jia, Xingyu Fu, Zhihao Zhang, Qingyun Liu:
WebAA: Website Association Analysis via Multi-resource Similarity Computation. ICCS (2) 2025: 50-64 - [c100]Jiangchao Chen, Zhuojun Jiang, Jiangyi Yin, Dongfang Hao, Zhao Li, Meijie Du, Qingyun Liu:
NotiCorr: Exposing Social Relationships via Notification Traffic of Instant Messaging Applications. ICCS (2) 2025: 78-93 - [c99]Ziwei Zhang, Jiangyi Yin, Zhao Li, Jiangchao Chen, Meijie Du, Zhongyi Zhang, Qingyun Liu:
Encrypted Malicious Traffic Detection Using Multi-instance Learning. ICCS (2) 2025: 265-280 - [c98]Hongwei Wu, Jin Pan, Rong Yang, Hong Zhang, Guang Shi, Zhuojun Jiang, Qingyun Liu:
PAWS: Passive Concept Drift Adaptation Based on Instance Weighting and Subspace Alignment in Data Stream. ICIC (20) 2025: 236-247 - [c97]Qiuwen Lu, Qingyun Liu:
A Lightweight Framework for Network Traffic Scheduling in Cloud-Native Environments. ICT 2025: 1-6 - [c96]Hongbo Xu, Chengxiang Si, Shuhao Li, Zhenyu Cheng, Chenxu Wang, Jiang Xie, Peishuai Sun, Qingyun Liu:
FlowMiner: A Powerful Model Based on Flow Correlation Mining for Encrypted Traffic Classification. INFOCOM 2025: 1-10 - [c95]Yifei Cheng
, Yujia Zhu
, Baiyang Li
, Peishuai Sun
, Yong Ding
, Xinhao Deng
, Qingyun Liu
:
HOLMES & WATSON: A Robust and Lightweight HTTPS Website Fingerprinting through HTTP Version Parallelism. WWW 2025: 1078-1092 - 2024
- [c94]Luting Zhang, Yubing Li, Wei Yang, Qingyun Liu, Rong Yang:
PFTB: A Prediction-Based Fair Token Bucket Algorithm based on CRDT. CSCWD 2024: 928-934 - [c93]Liang Jiao, Yujia Zhu, Wenxiu Zhang, Lei Zhao, Yi Zhou, Qingyun Liu:
6GAI: Active IPv6 Address Generation via Adversarial Training with Leaked Information. CSCWD 2024: 1079-1085 - [c92]Baiyang Li, Yujia Zhu, Yong Ding, Yong Sun, Yuedong Zhang, Qingyun Liu, Li Guo:
From Fingerprint to Footprint: Characterizing the Dependencies in Encrypted DNS Infrastructures. ESORICS (2) 2024: 45-64 - [c91]Hongbo Xu, Zhenyu Cheng, Shuhao Li, Chenxu Wang, Peishuai Sun, Jiang Xie, Qingyun Liu:
ProxyKiller: An Anonymous Proxy Traffic Attack Model Based on Traffic Behavior Graphs. ESORICS (2) 2024: 162-181 - [c90]Peishuai Sun, Chengxiang Si, Shuhao Li, Zhenyu Cheng, Shuyuan Zhao, Qingyun Liu:
A Targeted Adversarial Attack Method for Multi-Classification Malicious Traffic Detection. ICASSP 2024: 4765-4769 - [c89]Xiaoou Zhang, Yang Gao, Yang Liu, Yujia Zhu, Peng Zhang
, Chuan Zhou, Qingyun Liu, Hongyang Chen:
Meta Structure Search for Link Weight Prediction in Heterogeneous Graphs. ICASSP 2024: 5195-5199 - [c88]Zhenni Liu, Yong Sun, Zhao Li, Jiangyi Yin, Qingyun Liu:
Beneath the Facade of IP Leasing: Graph-Based Approach for Identifying Malicious IP Blocks. ICCS (3) 2024: 46-53 - [c87]Meng Zeng, Yujia Zhu, Baiyang Li, Yuedong Zhang, Qingyun Liu, Binxing Fang:
Failed Yet Stored: A First Look at DNS Negative Caching. IPCCC 2024: 1-10 - [c86]Haizhang Zhu, Zhongyi Zhang, Zhou Zhou, Chengwei Peng, Hongfei Zhang, Shu Li, Rong Yang, Qingyun Liu:
P4-FILB: Stateless Load Balancing Mechanism in Firewall and IPv6 Environment with P4. IPCCC 2024: 1-8 - [c85]Liang Jiao, Jianqiang Li, Wenxiu Zhang, Tianyu Cui, Yi Zhou, Yujia Zhu, Qingyun Liu:
Measuring Encrypted DNS Service with TLS1.3 Support over IPv6. ISCC 2024: 1-7 - [c84]Qiuwen Lu, Qingyun Liu, Binxing Fang:
NFVDC: A flexible and efficient NFV platform for dynamic service chaining. ISPA 2024: 1849-1855 - [c83]Yijun Zhao, Lingjing Yu, Yong Sun, Qingyun Liu, Bo Luo:
No Source Code? No Problem! Demystifying and Detecting Mask Apps in iOS. ICPC 2024: 358-369 - [c82]Weitao Tang
, Jianqiang Li
, Meijie Du
, Die Hu
, Qingyun Liu
:
Zenith: Real-time Identification of DASH Encrypted Video Traffic with Distortion. ACM Multimedia 2024: 7200-7209 - [c81]Meijie Du, Mingqi Hu, Shu Li, Zhao Li, Qingyun Liu:
SCENE: Shape-based Clustering for Enhanced Noise-resilient Encrypted Traffic Classification. TrustCom 2024: 306-315 - [c80]Yunyang Qin, Yujia Zhu, Linkang Zhang, Baiyang Li, Yong Ding, Qingyun Liu:
LayyerX: Unveiling the Hidden Layers of DoH Server via Differential Fingerprinting. TrustCom 2024: 354-361 - [c79]Fengyuan Shi, Zhou Zhou, Jiang Guo, Renjie Li, Zhongyi Zhang, Shu Li, Qingyun Liu, Xiuguo Bao:
LightRL-AD: A Lightweight Online Reinforcement Learning Approach for Autonomous Defense against Network Attacks. TrustCom 2024: 1614-1621 - [c78]Qingfeng Zhang
, Muqian Chen, Xuebin Wang, Can Zhao, Qingyun Liu, Jinqiao Shi:
Knock-Knock: De-Anonymise Hidden Services by Exploiting Service Answer Vulnerability. WCNC 2024: 1-7 - [c77]Chenxu Wang
, Jiangyi Yin
, Zhao Li
, Hongbo Xu
, Zhongyi Zhang
, Qingyun Liu
:
Identifying VPN Servers through Graph-Represented Behaviors. WWW 2024: 1790-1799 - [c76]Qingfeng Zhang
, Zhiyang Teng
, Xuebin Wang
, Yue Gao
, Qingyun Liu
, Jinqiao Shi
:
HSDirSniper: A New Attack Exploiting Vulnerabilities in Tor's Hidden Service Directories. WWW 2024: 1812-1823 - 2023
- [c75]Dingkang Han, Yujia Zhu, Liang Jiao, Dikai Mo, Yong Sun, Yuedong Zhang, Qingyun Liu:
DualDNSMiner: A Dual-Stack Resolver Discovery Method Based on Alias Resolution. CollaborateCom (3) 2023: 347-364 - [c74]Zhao Li, Jiangchao Chen, Xiaoqing Ma, Meijie Du, Zhongyi Zhang, Qingyun Liu:
A Robust and Accurate Encrypted Video Traffic Identification Method via Graph Neural Network. CSCWD 2023: 867-872 - [c73]Yixiang Zhao, Zhou Zhou, Jiang Guo, Wei Yang, Shu Li, Qingyun Liu:
DarkFT: Automatic Scanning Behavior Analysis with FastText in Darknet Traffic. CSCWD 2023: 1031-1036 - [c72]Xinyan Li, Yujia Zhu, Xiaoou Zhang, Zhen Jie, Qingyun Liu:
SpoofingGuard: A Content-agnostic Framework for Email Spoofing Detection via Delivery Graph. CSCWD 2023: 1098-1105 - [c71]Fengyuan Shi, Zhou Zhou, Wei Yang, Shu Li, Qingyun Liu, Xiuguo Bao:
AHIP: An Adaptive IP Hopping Method for Moving Target Defense to Thwart Network Attacks. CSCWD 2023: 1300-1305 - [c70]Meijie Du, Minchao Xu, Kedong Liu, Weitao Tang
, Lijuan Zheng, Qingyun Liu:
Long-Short Terms Frequency: A Method for Encrypted Video Streaming Identification. CSCWD 2023: 1581-1588 - [c69]Xiaoqing Ma, Chao Zheng, Zhao Li, Jiangyi Yin, Qingyun Liu, Xunxun Chen:
Detecting Fake-Normal Pornographic and Gambling Websites through one Multi-Attention HGNN. CSCWD 2023: 1741-1747 - [c68]Chenxu Wang, Zhao Li, Jiangyi Yin, Zhenni Liu, Zhongyi Zhang, Qingyun Liu:
IDTracker: Discovering Illicit Website Communities via Third-party Service IDs. DSN 2023: 459-469 - [c67]Dikai Mo, Yujia Zhu, Zhen Jie, Yong Sun, Qingyun Liu, Binxing Fang:
Unveiling Flawed Cache Structures in DNS Infrastructure via Record Watermarking. GLOBECOM 2023: 6024-6029 - [c66]Weitao Tang
, Meijie Du, Zhao Li, Shu Li, Zhou Zhou, Qingyun Liu:
Shrink: Identification of Encrypted Video Traffic Based on QUIC. IPCCC 2023: 140-149 - [c65]Yuqi Qiu
, Baiyang Li
, Zhiqian Li, Liang Jiao, Yujia Zhu, Qingyun Liu:
Before Toasters Rise Up: A View into the Emerging DoH Resolver's Deployment Risk. ISCC 2023: 1149-1155 - [c64]Liang Jiao, Yujia Zhu, Xingyu Fu, Yi Zhou, Fenglin Qin, Qingyun Liu:
CCSv6: A Detection Model for DNS-over-HTTPS Tunnel Using Attention Mechanism over IPv6. ISCC 2023: 1327-1330 - [c63]Qingfeng Zhang
, Jiawei Zhu, Muqian Chen, Xuebin Wang, Qingyun Liu, Jinqiao Shi:
A Comprehensive Evaluation of the Impact on Tor Network Anonymity Caused by ShadowRelay. ISCC 2023: 1369-1375 - [c62]Hao Miao, Zhou Zhou, Renjie Li, Fengyuan Shi, Wei Yang, Shu Li, Qingyun Liu:
Hunting for Hidden RDP-MITM: Analyzing and Detecting RDP MITM Tools Based on Network Features. ISCC 2023: 1448-1453 - [c61]Yuzhen Li, Zhou Zhou, Renjie Li, Fengyuan Shi, Jiang Guo, Qingyun Liu:
GoGDDoS: A Multi-Classifier for DDoS Attacks Using Graph Neural Networks. ISCC 2023: 1462-1467 - [c60]Songyue Chen
, Rong Yang, Hong Zhang, Hongwei Wu, Yanqin Zheng, Xingyu Fu, Qingyun Liu:
SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection. ISC 2023: 59-78 - [c59]Baiyang Li
, Yujia Zhu, Qingyun Liu, Yong Sun, Yuedong Zhang, Li Guo:
Wrapping DNS into HTTP(S): An Empirical Study on Name Resolution in Mobile Applications. IFIP Networking 2023: 1-9 - [c58]Linkang Zhang, Yunyang Qin, Yujia Zhu, Yifei Cheng, Zhen Jie, Qingyun Liu:
SeeStar: An Efficient Starlink Asset Detection Framework. SciSec 2023: 139-156 - [c57]Liang Jiao, Yujia Zhu, Baiyang Li, Qingyun Liu:
Measuring DNS-over-Encryption Performance Over IPv6. TrustCom 2023: 444-451 - 2022
- [c56]Yunfan Li, Lingjing Yu, Qingyun Liu:
HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification. Inscrypt 2022: 373-390 - [c55]Yuzhen Li, Renjie Li, Zhou Zhou, Jiang Guo, Wei Yang, Meijie Du, Qingyun Liu:
GraphDDoS: Effective DDoS Attack Detection Using Graph Neural Networks. CSCWD 2022: 1275-1280 - [c54]Chenming Chang
, Wei Yang, Chao Zheng, Ping Jiang, Liang Zhan, Qingyun Liu:
Accelerate State Sharing of Network Function with RDMA. GLOBECOM 2022: 1-6 - [c53]Wei Yang, Yubing Li, Ping Jiang, Zhou Zhou, Qingyun Liu:
GDMD: A Transmission Control Scheme with Block Information-aware for Delay Sensitive Multimedia. HPCC/DSS/SmartCity/DependSys 2022: 446-455 - [c52]Zeyi Deng, Wei Yang, Minchao Xu, Meijie Du, Yuzhen Li, Zhou Zhou, Qingyun Liu:
SequenceShield: A Robust and Accurate DDoS Detection Method via Serializing the Traffic with Direction Information. HPCC/DSS/SmartCity/DependSys 2022: 499-507 - [c51]Minchao Xu, Meijie Du, Zhao Li, Zeyi Deng, Wei Yang, Qingyun Liu:
RTD: The Road to Encrypted Video Traffic Identification in the Heterogeneous Network Environments. HPCC/DSS/SmartCity/DependSys 2022: 1697-1704 - [c50]Yubing Li, Wei Yang, Zhou Zhou, Qingyun Liu, Zhao Li, Shu Li:
P4-NSAF: defending IPv6 networks against ICMPv6 DoS and DDoS attacks with P4. ICC 2022: 5005-5010 - [c49]Mingyu Zhang, Fang Fang, Hao Li, Qingyun Liu, Yangchun Li, Hailong Wang:
MHGEE: Event Extraction via Multi-granularity Heterogeneous Graph. ICCS (1) 2022: 473-487 - [c48]Zhao Li, Shijun Zhang, Jiangyi Yin, Meijie Du, Zhongyi Zhang, Qingyun Liu:
Fighting Against Piracy: An Approach to Detect Pirated Video Websites Enhanced by Third-party Services. ISCC 2022: 1-7 - [c47]Yuqi Qiu
, Baiyang Li, Liang Jiao, Yujia Zhu, Qingyun Liu:
Detection of DoH Tunnels with Dual-Tier Classifier. MSN 2022: 417-421 - [c46]Xiaoqing Ma, Chao Zheng, Zhao Li, Jiangyi Yin, Qingyun Liu, Xunxun Chen:
A Lightweight Graph-based Method to Detect Pornographic and Gambling Websites with Imperfect Datasets. TrustCom 2022: 291-298 - 2021
- [c45]Shuai Zhang, Zhou Zhou, Da Li, Youbing Zhong, Qingyun Liu, Wei Yang, Shu Li:
Attributed Heterogeneous Graph Neural Network for Malicious Domain Detection. CSCWD 2021: 397-403 - [c44]Ping Jiang, Shuo Zhang, Qingyun Liu, Chao Zheng:
A P4-Based Packet Scheduling Approach for Clustered Deep Packet Inspection Appliances. ICCCN 2021: 1-9 - [c43]Xiaoqing Ma, Chao Zheng, Zhao Li, Qingyun Liu, Xunxun Chen:
CDNFinder: Detecting CDN-hosted Nodes by Graph-Based Semi-Supervised Classification. ISCC 2021: 1-7 - [c42]Shu Li
, Nayyar Abbas Zaidi
, Qingyun Liu, Gang Li
:
Neighbours and Kinsmen: Hateful Users Detection with Graph Neural Network. PAKDD (1) 2021: 434-446 - [c41]Jiating Wu, Yujia Zhu, Baiyang Li, Qingyun Liu, Binxing Fang:
Peek Inside the Encrypted World: Autoencoder-Based Detection of DoH Resolvers. TrustCom 2021: 783-790 - 2020
- [c40]Youbing Zhong, Zhou Zhou, Xuan Liu
, Da Li, Meijun Guo, Shuai Zhang, Qingyun Liu, Li Guo:
BPA: The Optimal Placement of Interdependent VNFs in Many-Core System. CollaborateCom (2) 2020: 305-319 - [c39]Caiyun Huang, Yujia Zhu, Yong Sun, Qingyun Liu, Binxing Fang:
How Many Users Behind A Local Recursive DNS Server? Estimated by Delta-Time Cluster Model. HPCC/DSS/SmartCity 2020: 465-474 - [c38]Youting Liu, Shu Li, Chengwei Zhang, Chao Zheng, Yong Sun, Qingyun Liu:
ITP-KNN: Encrypted Video Flow Identification Based on the Intermittent Traffic Pattern of Video and K-Nearest Neighbors Classification. ICCS (2) 2020: 279-293 - [c37]Youting Liu, Shu Li, Chengwei Zhang, Chao Zheng, Yong Sun, Qingyun Liu:
DOOM: a Training-Free, Real-Time Video Flow Identification Method for Encrypted Traffic. ICT 2020: 1-5 - [c36]Xiaoou Zhang, Zhao Li, Yujia Zhu, Qingyun Liu, Chao Zheng:
Traceback: Learning to Identify Website's Landing URLs via Noisy Web Traces Passively. ICT 2020: 1-6 - [c35]Shu Li
, Yishuo Zhang
, Penghui Jiang, Zhao Li, Chengwei Zhang, Qingyun Liu:
Predicting User Influence in the Propagation of Toxic Information. KSEM (1) 2020: 459-470 - [c34]Fengzhao Shi, Chao Zheng, Yiming Cui, Qingyun Liu:
MAAN: A Multiple Attribute Association Network for Mobile Encrypted Traffic Classification. SecureComm (1) 2020: 172-189 - [c33]Lingjing Yu, Bo Luo, Jun Ma, Zhaoyu Zhou, Qingyun Liu:
You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi. USENIX Security Symposium 2020: 55-72
2010 – 2019
- 2019
- [c32]Youbing Zhong, Zhou Zhou, Da Li, Wenliang He, Chao Zheng, Qingyun Liu, Li Guo:
NTS: A Scalable Virtual Testbed Architecture with Dynamic Scheduling and Backpressure. CollaborateCom 2019: 583-599 - [c31]Zhongyi Zhang, Chao Zheng, Wei Yang, Yang Liu, Rong Yang, Qingyun Liu:
Tensor: A Transaction-Oriented Low-Latency and Reliable Data Distribution Scheme for Multi-IDCs Based on Redis. HPCC/SmartCity/DSS 2019: 2351-2359 - [c30]Baiyang Li
, Yujia Zhu, Qingyun Liu, Zhou Zhou, Li Guo:
Hunting for Invisible SmartCam: Characterizing and Detecting Smart Camera Based on Netflow Analysis. ICC 2019: 1-7 - [c29]Xiang Tian, Yujia Zhu, Zhao Li, Chao Zheng, Qingyun Liu, Yong Sun:
MeshTrust: A CDN-Centric Trust Model for Reputation Management on Video Traffic. ICCS (2) 2019: 318-331 - [c28]Zhaoyu Zhou, Lingjing Yu, Qingyun Liu, Yang Liu, Bo Luo
:
Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities. ICICS 2019: 763-780 - [c27]Caiyun Huang, Yujia Zhu, Yong Sun, Qingyun Liu, Binxing Fang:
IDNS: A High-Performance Model for Identification of DNS Infrastructures on Large-scale Traffic. ISCC 2019: 1-7 - [c26]Youbing Zhong, Zhou Zhou, Da Li, Meijun Guo, Qingyun Liu, Yang Liu, Li Guo:
SAED: A Self-Adaptive Encryption and Decryption Architecture. ISPA/BDCloud/SocialCom/SustainCom 2019: 388-397 - [c25]Guolin Tan, Peng Zhang, Lei Zhang, Yu Zhang, Chuang Zhang, Qingyun Liu, Xinran Liu:
Learning from Time Series with Outlier Correction for Malicious Domain Identification. ISSRE Workshops 2019: 42-46 - 2018
- [c24]Zhou Zhou, Xi Zhang, Qingyun Liu, Yujia Zhu, Da Li, Li Guo:
SASD: A Self-Adaptive Stateful Decompression Architecture. GLOBECOM 2018: 206-212 - [c23]Guolin Tan, Peng Zhang, Qingyun Liu, Xinran Liu, Chunge Zhu:
DomainObserver: A Lightweight Solution for Detecting Malicious Domains Based on Dynamic Time Warping. ICCS (1) 2018: 208-220 - [c22]Chao Zheng, Xiang Li, Qingyun Liu, Yong Sun, Binxing Fang:
Hashing Incomplete and Unordered Network Streams. IFIP Int. Conf. Digital Forensics 2018: 199-224 - [c21]Guolin Tan, Peng Zhang, Qingyun Liu, Xinran Liu, Chunge Zhu, Li Guo:
MalFilter: A Lightweight Real-Time Malicious URL Filtering System in Large-Scale Networks. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 565-571 - [c20]Peng Zhang, Lichao Xing, Ninggou Yang, Guolin Tan, Qingyun Liu, Chuang Zhang:
Redis++: A High Performance In-Memory Database Based on Segmented Memory Management and Two-Level Hash Index. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 840-847 - [c19]Lingjing Yu, Tao Liu, Zhaoyu Zhou, Yujia Zhu, Qingyun Liu, Jianlong Tan:
WDMTI: Wireless Device Manufacturer and Type Identification Using Hierarchical Dirichlet Process. MASS 2018: 19-27 - [c18]Lingjing Yu, Sri Mounica Motipalli, Dongwon Lee
, Peng Liu, Heng Xu, Qingyun Liu, Jianlong Tan, Bo Luo
:
My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks. SACMAT 2018: 93-104 - [c17]Guolin Tan, Peng Zhang, Qingyun Liu, Xinran Liu, Chunge Zhu, Fenghu Dou:
Adaptive Malicious URL Detection: Learning in the Presence of Concept Drifts. TrustCom/BigDataSE 2018: 737-743 - [c16]Xiang Tian, Yujia Zhu, Zhao Li, Chao Zheng, Yong Sun, Qingyun Liu:
VegaStar: An Illegal Domain Detection System on Large-Scale Video Traffic. TrustCom/BigDataSE 2018: 783-789 - 2017
- [c15]Xiang Tian, Yu Wang, Yujia Zhu, Yong Sun, Qingyun Liu:
De-anonymous and Anonymous Technologies for Network Traffic Release. ATIS 2017: 193-200 - [c14]Zhipeng Chen, Peng Zhang, Qingyun Liu:
ProxyDetector: A Guided Approach to Finding Web Proxies. LCN 2017: 676-682 - [c13]Yujia Zhu, Yu Wang, Qingyun Liu, Yang Liu, Peng Zhang:
WiFi fingerprint releasing for indoor localization based on differential privacy. PIMRC 2017: 1-6 - 2016
- [c12]Zhipeng Chen, Peng Zhang, Chao Zheng, Qingyun Liu:
CookieMiner: Towards real-time reconstruction of web-downloading chains from network traces. ICC 2016: 1-6 - 2015
- [c11]Hongzhou Sha, Zhou Zhou, Qingyun Liu, Tingwen Liu
, Chao Zheng:
Limited Dictionary Builder: An approach to select representative tokens for malicious URLs detection. ICC 2015: 7077-7082 - [c10]Peng Zhang, Yan Li, Qingyun Liu, Hailun Lin:
A Scalable Distributed Private Stream Search System. ICDCS Workshops 2015: 128-135 - [c9]Qingyun Liu, Hongtao Xie, Yizhi Liu, Chuang Zhang, Li Guo:
Data-oriented multi-index hashing. ICME 2015: 1-6 - 2014
- [c8]Cuiwen Xiong, Peng Zhang, Yan Li, Shipeng Zhang, Qingyun Liu, Jianlong Tan:
A Memory-Based Continuous Query Index for Stream Processing. BigData Congress 2014: 768-769 - [c7]Hongzhou Sha, Qingyun Liu, Zhou Zhou, Chao Zheng:
GuidedTracker: Track the victims with access logs to finding malicious web pages. GLOBECOM 2014: 564-569 - [c6]Yanbing Liu
, Qingyun Liu, Ping Liu, Jianlong Tan, Li Guo:
A factor-searching-based multiple string matching algorithm for intrusion detection. ICC 2014: 653-658 - [c5]Qiuwen Lu, Zhou Zhou, Hongzhou Sha, Qingyun Liu, Hongcheng Sun:
Self-Adaptive Frequency Scaling Architecture for Intrusion Detection System. ISCTCS 2014: 74-82 - [c4]Hongzhou Sha, Xiaoqian Li, Qingyun Liu, Zhou Zhou, Liang Zhang, Lidong Wang:
RAMID: A Novel Risk Assessment Model of Information Dissemination on Social Network. ISCTCS 2014: 295-303 - 2013
- [c3]Chen Chen, Qingyun Liu, Hongzhou Sha, Zhou Zhou, Chao Zheng:
A New Approach to Decrease Invalidate Rate of Weak Consistency Methods in Web Proxy Caching. ISCTCS 2013: 107-114 - [c2]Hongzhou Sha, Tingwen Liu
, Peng Qin, Yong Sun, Qingyun Liu:
EPLogCleaner: Improving Data Quality of Enterprise Proxy Logs for Efficient Web Usage Mining. ITQM 2013: 812-818 - 2012
- [c1]Qingyun Liu, Wenzhong Feng, Qiong Dai:
A Dynamic Strategy to Cache Out-of-Sequence Packet in DPI System. ISCTCS 2012: 564-571
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-05 22:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint