Login / Signup
Liya Su
Publication Activity (10 Years)
Years Active: 2017-2024
Publications (10 Years): 11
Top Topics
Attack Detection
Language Model
Pairwise
Graph Kernels
Top Venues
TrustCom/BigDataSE
CoRR
ISPA/IUCC/BDCloud/SocialCom/SustainCom
USENIX Security Symposium
</>
Publications
</>
Shang Shang
,
Xinqiang Zhao
,
Zhongjiang Yao
,
Yepeng Yao
,
Liya Su
,
Zijing Fan
,
Xiaodan Zhang
,
Zhengwei Jiang
Can LLMs Deeply Detect Complex Malicious Queries? A Framework for Jailbreaking via Obfuscating Intent.
CoRR
(2024)
Xiaoyi Chen
,
Siyuan Tang
,
Rui Zhu
,
Shijun Yan
,
Lei Jin
,
Zihao Wang
,
Liya Su
,
XiaoFeng Wang
,
Haixu Tang
The Janus Interface: How Fine-Tuning in Large Language Models Amplifies the Privacy Risks.
CoRR
(2023)
Liya Su
,
Xinyue Shen
,
Xiangyu Du
,
Xiaojing Liao
,
XiaoFeng Wang
,
Luyi Xing
,
Baoxu Liu
Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications.
USENIX Security Symposium
(2021)
Liya Su
,
Yepeng Yao
,
Zhigang Lu
,
Baoxu Liu
Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-Based Network Attack Detection.
TrustCom/BigDataSE
(2019)
Yepeng Yao
,
Liya Su
,
Zhigang Lu
,
Baoxu Liu
STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection.
TrustCom/BigDataSE
(2019)
Yepeng Yao
,
Liya Su
,
Chen Zhang
,
Zhigang Lu
,
Baoxu Liu
Marrying Graph Kernel with Deep Neural Network: A Case Study for Network Anomaly Detection.
ICCS (2)
(2019)
Peian Yang
,
Yang Wu
,
Liya Su
,
Baoxu Liu
网络空间威胁情报共享技术综述 (Overview of Threat Intelligence Sharing Technologies in Cyberspace).
计算机科学
45 (6) (2018)
Yepeng Yao
,
Liya Su
,
Zhigang Lu
DeepGFL: Deep Feature Learning via Graph for Attack Detection on Flow-Based Network Traffic.
MILCOM
(2018)
Liya Su
,
Yepeng Yao
,
Ning Li
,
Junrong Liu
,
Zhigang Lu
,
Baoxu Liu
Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection.
TrustCom/BigDataSE
(2018)
Mingyi Chen
,
Yepeng Yao
,
Junrong Liu
,
Bo Jiang
,
Liya Su
,
Zhigang Lu
A Novel Approach for Identifying Lateral Movement Attacks Based on Network Embedding.
ISPA/IUCC/BDCloud/SocialCom/SustainCom
(2018)
Qiang Li
,
Yunan Zhang
,
Liya Su
,
Yang Wu
,
Xinjian Ma
,
Zeming Yang
An Improved Method to Unveil Malware's Hidden Behavior.
Inscrypt
(2017)