Follow
Mingxuan Liu
Title
Cited by
Cited by
Year
Casino royale: a deep exploration of illegal online gambling
H Yang, K Du, Y Zhang, S Hao, Z Li, M Liu, H Wang, H Duan, Y Shi, X Su, ...
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
372019
Lies in the air: Characterizing fake-base-station spam ecosystem in china
Y Zhang, B Liu, C Lu, Z Li, H Duan, S Hao, M Liu, Y Liu, D Wang, Q Li
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
312020
Argot: Generating adversarial readable chinese texts
Z Zhang, M Liu, C Zhang, Y Zhang, Z Li, Q Li, H Duan, D Sun
Proceedings of the Twenty-Ninth International Conference on International …, 2021
232021
Encrypted malware traffic detection via graph-based network analysis
Z Fu, M Liu, Y Qin, J Zhang, Y Zou, Q Yin, Q Li, H Duan
Proceedings of the 25th International Symposium on Research in Attacks …, 2022
202022
Detecting and characterizing SMS spearphishing attacks
M Liu, Y Zhang, B Liu, Z Li, H Duan, D Sun
Proceedings of the 37th Annual Computer Security Applications Conference …, 2021
162021
TL; DR hazard: a comprehensive study of levelsquatting scams
K Du, H Yang, Z Li, H Duan, S Hao, B Liu, Y Ye, M Liu, X Su, G Liu, ...
Security and Privacy in Communication Networks: 15th EAI International …, 2019
102019
Valcat: Variable-length contextualized adversarial transformations using encoder-decoder language model
C Deng, M Liu, Y Qin, J Zhang, HX Duan, D Sun
Proceedings of the 2022 Conference of the North American Chapter of the …, 2022
72022
Ethics in security research: Visions, reality, and paths forward
Y Zhang, M Liu, M Zhang, C Lu, H Duan
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2022
52022
Automatic generation of adversarial readable chinese texts
M Liu, Z Zhang, Y Zhang, C Zhang, Z Li, Q Li, H Duan, D Sun
IEEE Transactions on Dependable and Secure Computing 20 (2), 1756-1770, 2022
42022
Exploring the characteristics and security risks of emerging emoji domain names
M Liu, Y Zhang, B Liu, H Duan
European Symposium on Research in Computer Security, 186-206, 2022
22022
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab) use in the Wild
Z Zhang, G Hong, X Li, Z Fu, J Zhang, M Liu, C Wang, J Chen, B Liu, ...
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
12023
Into the Dark: Unveiling Internal Site Search Abused for Black Hat SEO
Y Zhang, M Liu, B Liu, Y Zhang, H Duan, M Zhang, H Jiang, Y Li, F Shi
Tickets or Privacy? Understand the Ecosystem of Chinese Ticket Grabbing Apps
Y Liu, Y Zhang, B Liu, H Duan, Q Li, M Liu, R Li, J Yao
ChatScam: Unveiling the Rising Impact of ChatGPT on Domain Name Abuse
M Liu, Z Jin, J Yang, B Liu, H Duan, Y Liu, X Liu, S Tang
Understanding the Implementation and Security Implications of Protective DNS Services
M Liu, Y Zhang, X Li, C Lu, B Liu, H Duan, X Zheng
The system can't perform the operation now. Try again later.
Articles 1–15