Xin Liu

Xin Liu
Lanzhou University | LZU · School of Information Science & Engineering

Doctor of Engineering
Hack for FUN ╮( ̄▽ ̄"")╭

About

28
Publications
5,479
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
450
Citations
Introduction
Network Security / Code Analysis / Blockchain / Open-Source Intelligence

Publications

Publications (28)
Conference Paper
Full-text available
In the digital age, safeguarding privacy against sophisticated eavesdropping technologies is increasingly crucial. We introduce an innovative ultrasonic jamming device enhanced by a novel Dynamic Inter-modulation Modulation (DIM) algorithm, designed to counteract unauthorized audio surveillance. Utilizing nonlinear acoustic effects, the DIM algorit...
Article
Full-text available
Compared with traditional environments, the cloud environment exposes online services to additional vulnerabilities and threats of cyber attacks, and the cyber security of cloud platforms is becoming increasingly prominent. A piece of code, known as a Webshell, is usually uploaded to the target servers to achieve multiple attacks. Preventing Webshe...
Article
Full-text available
Voice-controlled (VC) systems, such as mobile phones and smart speakers, enable users to operate smart devices through voice commands. Previous works (e.g., LightCommands) show that attackers can trigger VC systems to respond to various audio commands by injecting light signals. However, LightCommands only discusses attacks on devices with a single...
Article
Full-text available
As smart contracts, represented by Solidity, become deeply integrated into the manufacturing industry, blockchain-based Digital Twins (DT) has gained momentum in recent years. Most of the blockchain infrastructures in widespread use today are based on the Proof-of-Work (PoW) mechanism, and the process of creating blocks is known as “mining”. Mining...
Conference Paper
Full-text available
Voice is a vital medium for transmitting information. The advancement of speech synthesis technology has resulted in high-quality synthesized voices indistinguishable from human ears. These fake voices have been widely used in natural Deepfake production and other malicious activities, raising serious concerns regarding security and privacy. To dea...
Conference Paper
Full-text available
Voice is an essential medium for human communication and collaboration, and its trustworthiness is of great importance to humans. Synthesizing fake voices and detecting synthesized voices are two sides of a coin. Both sides have made great strides with the recently prospering deep learning techniques. Attackers started using AI techniques to synthe...
Article
Full-text available
The Internet of Things (IoT) has become a focus of information infrastructure development in recent years. The smart blockchain can provide various solutions for trust, security, and privacy (TSP) challenges to protect IoT data, and smart contracts are the foundation of blockchain intelligence, and greatly enhance the ability of smart blockchain to...
Conference Paper
Full-text available
As the number of vulnerabilities increases day by day, security management requires more and more structured data. In addition to textual descriptions of vulnerabilities, security engineers must classify and assess vulnerabilities and clarify their associated techniques. Vulnerability Description Mapping (VDM) refers to mapping vulnerabilities to C...
Article
Full-text available
Code classification is a meaningful task with plenty of practical applications. Combined with recently popular graph neural networks (GNNs), a body of research attempts to address the code classification problem with the help of fruitful achievements from deep learning (DL) area. To align GNN training with the nature of source code, practitioners...
Conference Paper
Full-text available
Background: With the boosting development of IoT technology, the supply chains of IoT devices become more powerful and sophisticated, and the security issues introduced by code reuse are becoming more prominent. Therefore, the detection and management of vulnerabilities through code similarity detection technology is of great significance for prote...
Presentation
Full-text available
Voice is an essential medium for humans to transfer information and build trust, and the trustworthiness of voice is of great importance to humans. With the development of deep learning technologies, attackers have started to use AI techniques to synthesize and even clone human voices. To combat the misuse of such techniques, researchers have propo...
Article
Full-text available
With the development of IoT technology, more and more IoT devices are connected to the network. Due to the hardware constraints of IoT devices themselves, it is difficult for developers to embed security software into them. Therefore, it is better to protect IoT devices at the traffic level. The effect of malicious traffic detection based on neural...
Presentation
Full-text available
Most cryptocurrencies with high value are based on proof-of-work (PoW), including Bitcoin, Litecoin, and Ether. The process to "produce" them is usually called "mining", and the people involved are called "miners". The mining process is one of the most important infrastructures in the PoW based blockchain system. As the number of miners increases,...
Article
Full-text available
With the commercialization of 5G technology, various Mobile Edge Computing (MEC) services are being deployed widely. Generally, MEC services rely on MEC devices and servers deployed at the edge of the network. Whether it is a MEC device or an edge server, most of them lack computing resources, and it is difficult to implement powerful security capa...
Conference Paper
Full-text available
Since the birth of the Internet, the quality ofnetwork service has been a widespread concerned problem. Withthe continuous development of communication and informationtechnology, people gradually realized that the contradictionbetween the limited resources and the business requirementsof network cannot be fundamentally solved. In this paper, wedesi...
Article
Full-text available
Immunization is an indispensable mechanism for preventing infectious diseases in modern society, and vaccine safety is closely related to public health and national security. However, issues such as vaccine expiration and vaccine record fraud are still widespread in vaccine supply chains. Therefore, an effective management system for the supervisio...
Conference Paper
Full-text available
Web applications, as a conventional platform for sensitive data and important transactions, are of great significance to human society. But with its open source framework, the existing security vulnerabilities can easily be exploited by malicious users, especially when web developers fail to follow the secure practices. Here we present a distribute...
Article
The Internet of Things (IoT) is gradually becoming an infrastructure, providing a wide range of applications, from health monitoring to industrial control and many other social domains. Unfortunately, for open connectivity, it is always built on Hypertext Transfer Protocol (HTTP), which inherently brings in new challenging security threats. Paramet...
Conference Paper
Full-text available
Network security is a complex and difficult problem,in which web injection is one of the most serious securityproblems, especially webshell. A webshell is a malicious scriptused by an attacker with the intent to escalate and maintainpersistent access to an already compromised Web application.To recognize the webshells, a tool to analyze the behavio...
Article
Full-text available
Ad-hoc network is a temporary self-organizing network that needs no fixed infrastructure. So it has been applied extensively in many areas requesting temporary communication such as military field, emergency disaster relief and road traffic. While, due to the feature of self-organization and wireless communication channels, ad-hoc network is more v...
Conference Paper
Full-text available
Nowdays web services plays an important part inour daily life, thus the security of web servers and applicationshas become one of the key topics in cyber security. Web requestquery strings(queries) are responsible for passing parameters tothe referenced resources, thus vulnerable of being manipulatedby attackers to retrive sensitive data and even f...
Conference Paper
Full-text available
Generally, because the logistics business uses plain text in orders, the disclosure risk of user’s privacy information widely exists in various logistics business processes. In this paper, combined with cloud computing and two-dimensional code in networking technology, we build a secure, trusted logistics system, completely protect people’s privacy...

Network

Cited By