基本信息

云晓春 男 博导 中关村国家实验室
电子邮件: yunxiaochun@zgclab.edu.cn
通信地址: 海淀区翠湖北环路2号院3号楼
邮政编码:
电子邮件: yunxiaochun@zgclab.edu.cn
通信地址: 海淀区翠湖北环路2号院3号楼
邮政编码:
研究领域
计算机网络与信息安全
教育背景
学历
研究生
学位
工学博士
专利与奖励
奖励信息
(1) 国家互联网安全应急平台及关键技术,一等奖,国家级,2011
专利成果
[1] 基于主被动结合的音视频网站用户入口标识方法及系统. 2023-05-04.
[2] 一种基于音视频动态特征的流式匹配方法和装置. 2023-03-09.
[3] 一种车联网漏洞众测平台的检测方法. 2021-03-18.
[4] 一种基于通信行为规律的移动恶意用户识别方法及系统. 2021-05-27.
[5] 基于USRP的物联网设备流量分析装置. 2020-12-18.
[6] 云晓春, 李政, 范乐君, 袁静, 李承泽, 申任远. 一种车联网漏洞众测平台的检测方法. CN: CN111818042B, 2021-03-09.
[7] 云晓春, 张永铮, 李书豪, 周文涛, 成振语. 一种基于通信行为规律的移动恶意用户识别方法及系统. CN: CN111405562B, 2021-05-28.
[8] 云晓春, 李政, 李承泽, 王智勇, 申任远, 李涛, 黄磊, 吴志敏, 吴昊, 袁静, 肖佃艳, 范乐君, 陈燕呢. 基于USRP的物联网设备流量分析装置. CN: CN111131454B, 2020-12-08.
[9] 包秀国, 马宏远, 杜慧, 王博, 贺敏, 程学旗, 李雄, 刘玮, 刘春阳, 张瑾, 程工, 陈训逊, 王丽宏, 云晓春, 余智华. 一种层次化的互联网舆情指标体系的方法及系统. CN: CN104346425A, 2015-02-11.
[10] 包秀国, 马宏远, 杜慧, 王博, 贺敏, 程学旗, 李雄, 刘玮, 刘春阳, 张瑾, 程工, 陈训逊, 王丽宏, 云晓春, 余智华. 一种层次化的互联网舆情指标体系的方法及系统. CN: CN104346425B, 2017-10-31.
[11] 云晓春, 张永铮, 李书豪, 尹涛, 庹宇鹏. 一种远程控制重构方法及系统. CN: CN103347067B, 2016-04-20.
[12] 云晓春, 李书豪, 张永铮, 郝志宇, 肖军. 一种面向社交网络的恶意代码传播预测方法及系统. CN: CN103093049B, 2015-12-09.
[13] 云晓春, 李书豪, 张永铮, 臧天宁, 王一鹏. 一种恶意代码捕获方法及系统. CN: CN102833240B, 2016-02-03.
[2] 一种基于音视频动态特征的流式匹配方法和装置. 2023-03-09.
[3] 一种车联网漏洞众测平台的检测方法. 2021-03-18.
[4] 一种基于通信行为规律的移动恶意用户识别方法及系统. 2021-05-27.
[5] 基于USRP的物联网设备流量分析装置. 2020-12-18.
[6] 云晓春, 李政, 范乐君, 袁静, 李承泽, 申任远. 一种车联网漏洞众测平台的检测方法. CN: CN111818042B, 2021-03-09.
[7] 云晓春, 张永铮, 李书豪, 周文涛, 成振语. 一种基于通信行为规律的移动恶意用户识别方法及系统. CN: CN111405562B, 2021-05-28.
[8] 云晓春, 李政, 李承泽, 王智勇, 申任远, 李涛, 黄磊, 吴志敏, 吴昊, 袁静, 肖佃艳, 范乐君, 陈燕呢. 基于USRP的物联网设备流量分析装置. CN: CN111131454B, 2020-12-08.
[9] 包秀国, 马宏远, 杜慧, 王博, 贺敏, 程学旗, 李雄, 刘玮, 刘春阳, 张瑾, 程工, 陈训逊, 王丽宏, 云晓春, 余智华. 一种层次化的互联网舆情指标体系的方法及系统. CN: CN104346425A, 2015-02-11.
[10] 包秀国, 马宏远, 杜慧, 王博, 贺敏, 程学旗, 李雄, 刘玮, 刘春阳, 张瑾, 程工, 陈训逊, 王丽宏, 云晓春, 余智华. 一种层次化的互联网舆情指标体系的方法及系统. CN: CN104346425B, 2017-10-31.
[11] 云晓春, 张永铮, 李书豪, 尹涛, 庹宇鹏. 一种远程控制重构方法及系统. CN: CN103347067B, 2016-04-20.
[12] 云晓春, 李书豪, 张永铮, 郝志宇, 肖军. 一种面向社交网络的恶意代码传播预测方法及系统. CN: CN103093049B, 2015-12-09.
[13] 云晓春, 李书豪, 张永铮, 臧天宁, 王一鹏. 一种恶意代码捕获方法及系统. CN: CN102833240B, 2016-02-03.
出版信息
发表论文
[1] Xiaochun Yun, Yipeng Wang, Yongzheng Zhang. Encrypted TLS Traffic Classification on Cloud Platforms. IEEE/ACM Transactions on Networking (TON)[J]. 2023, [2] Wang, Yipeng, Yun, Xiaochun, Zhang, Yongzheng, Zhao, Chen, Liu, Xin. A Multi-Scale Feature Attention Approach to Network Traffic Classification and Its Model Explanation. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT[J]. 2022, 19(2): 875-889, http://dx.doi.org/10.1109/TNSM.2022.3149933.
[3] Hao, Zhiyu, Wang, Wei, Cui, Lei, Yun, Xiaochun, Ding, Zhenquan. iConSnap: An Incremental Continuous Snapshots System for Virtual Machines. IEEE TRANSACTIONS ON SERVICES COMPUTING[J]. 2022, 15(1): 539-550, http://dx.doi.org/10.1109/TSC.2019.2955700.
[4] Yun, Xiaochun, Xie, Jiang, Li, Shuhao, Zhang, Yongzheng, Sun, Peishuai. Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features. COMPUTERS & SECURITY[J]. 2022, 121: http://dx.doi.org/10.1016/j.cose.2022.102834.
[5] Zhenyu Cheng, Xiaochun Yun, Shuhao Li, Jinbu Geng, Rui Qin, Li Fan. DITA-NCG: Detecting Information Theft Attack Based on Node Communication Graph. ICCSnull. 2022, [6] Guangjun Wu, Xiaochun Yun, Yong Wang, BInbin Li. A Sketching Approach for Obtaining Real-Time Statistics Over Data Streams in Cloud. IEEE Transactions on Cloud Computing[J]. 2022, 10(2): 1462-1475, [7] Cui, Lei, Hao, Zhiyu, Jiao, Yang, Fei, Haiqiang, Yun, Xiaochun. VulDetector: Detecting Vulnerabilities Using Weighted Feature Graph Comparison. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2021, 16: 2004-2017, https://www.webofscience.com/wos/woscc/full-record/WOS:000613347100005.
[8] Zeng, Yuwei, Yun, Xiaochun, Chen, Xunxun, Li, Boquan, Tsang, Haiwei, Wang, Yipeng, Zang, Tianning, Zhang, Yongzheng. Finding disposable domain names: A linguistics-based stacking approach?. COMPUTER NETWORKS[J]. 2021, 184: http://dx.doi.org/10.1016/j.comnet.2020.107642.
[9] Peng, Yaqiong, Hao, Zhiyu, Yun, Xiaochun. Lock-Free Parallelization for Variance-Reduced Stochastic Gradient Descent on Streaming Data. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS[J]. 2020, 31(9): 2220-2231, http://dx.doi.org/10.1109/TPDS.2020.2987867.
[10] Yun, Xiaochun, Huang, Ji, Wang, Yipeng, Zang, Tianning, Zhou, Yuan, Zhang, Yongzheng. Khaos: An Adversarial Neural Network DGA With High Anti-Detection Ability. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2020, 15: 2225-2240, http://dx.doi.org/10.1109/TIFS.2019.2960647.
[11] Valeria V Krzhizhanovskaya, Gbor Zvodszky, Michael H Lees, Jack J Dongarra, Peter M A Sloot, Srgio Brissos, Joo Teixeira, Zhicheng Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Chengwei Peng. Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network. COMPUTATIONAL SCIENCE – ICCS 2020. 2020, 12139: 379-398, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7304021/.
[12] Valeria V Krzhizhanovskaya, Gbor Zvodszky, Michael H Lees, Jack J Dongarra, Peter M A Sloot, Srgio Brissos, Joo Teixeira, Xiaolin Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Jia Li. Challenge Collapsar (CC) Attack Traffic Detection Based on Packet Field Differentiated Preprocessing and Deep Neural Network. COMPUTATIONAL SCIENCE – ICCS 2020. 2020, 12139: 282-296, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7304042/.
[13] Xie, Jiang, Li, Shuhao, Yun, Xiaochun, Zhang, Yongzheng, Chang, Peng. HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics. COMPUTERS & SECURITY[J]. 2020, 96: http://dx.doi.org/10.1016/j.cose.2020.101923.
[14] 云晓春. Important Member Discovery of Attribution Trace based on Relevant Circle. CollaborateCom. 2019, [15] Li, Jia, Yun, Xiaochun, Tian, Mao, Xie, Jiang, Li, Shuhao, Zhang, Yongzheng, Zhou, Yu, IEEE. A Method of HTTP Malicious Traffic Detection on Mobile Networks. 2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC)null. 2019, [16] Liu, Zhicheng, Yun, Xiaochun, Zhang, Yongzheng, Wang, Yipeng, IEEE Comp Soc. CCGA: Clustering and Capturing Group Activities for DGA-based botnets detection. 2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019)null. 2019, 136-143, [17] 云晓春. MalShoot: Shooting Malicious Domains through Graph Embedding on passive DNS Data. CollaborateCom. 2018, [18] 云晓春. MalHunter: Performing a Timely Detection on Malicious Domains via a single DNS Query. The 2018 International Conference on Information and Communications Security. 2018, [19] 云晓春. 新形势下关键信息基础设施的安全保护. 信息安全与通信保密[J]. 2018, 27-32, http://lib.cqvip.com/Qikan/Article/Detail?id=676708505.
[20] 云晓春. 求同存异 维护秩序. 信息安全与通信保密[J]. 2017, 111-111, http://lib.cqvip.com/Qikan/Article/Detail?id=673699699.
[21] Wang, YiPeng, Yun, Xiaochun, Zhang, Yongzheng, Chen, Liwei, Zang, Tianning. Rethinking robust and accurate application protocol identification. COMPUTER NETWORKS[J]. 2017, 129: 64-78, http://dx.doi.org/10.1016/j.comnet.2017.09.006.
[22] Peng Chengwei, Yun Xiaochun, Zhang Yongzheng, Li Shuhao, Xiao Jun, IEEE. Discovering Malicious Domains through Alias-canonical Graph. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMSnull. 2017, 225-232, [23] Tuo, Yupeng, Yun, Xiaochun, Zhang, Yongzheng, IEEE. Towards Robust and Accurate Similar Trajectory Discovery: Weak-parametric Approaches. 2017 INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE (NAS)null. 2017, 21-30, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000427036600003.
[24] Zhang, Kai, Yun, Xiaochun, Zhang, XiaoYu, Zhu, Xiaobin, Li, Chao, Wang, Shupeng. Weighted hierarchical geographic information description model for social relation estimation. NEUROCOMPUTING (NEUCOM)[J]. 2016, 216: 554-560, http://dx.doi.org/10.1016/j.neucom.2016.08.030.
[25] Xiaochun Yun, Yipeng Wang, Yongzheng Zhang, Yu Zhou. A semantics-aware approach to the automated network protocol identification. IEEE / ACM TRANSACTIONS ON NETWORKING (TON). 2016, 24(1): http://kns.cnki.net/KCMS/detail/detail.aspx?QueryID=0&CurRec=1&recid=&FileName=SJCM6C390861B42A5B53635B5A2EF2760882&DbName=WWMERGEJ01&DbCode=WWME&yx=&pr=&URLID=&bsm=.
[26] Qiao, Yanchen, Yun, Xiaochun, Zhang, Yongzheng, IEEE. How to Automatically Identify the Homology of Different Malware?. 2016 IEEE TRUSTCOM/BIGDATASE/ISPAnull. 2016, 929-936, [27] Zhang Kai, Yun Xiaochun, Liang Jiguang, 张晓宇, Li Chao, Tian Bin. Retweeting behavior prediction using probabilistic matrix factorization. IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC)null. 2016, 1185-1192, [28] Qiao, Yanchen, Yun, Xiaochun, Zhang, Yongzheng, IEEE. Fast Reused Function Retrieval Method Based on Simhash and Inverted Index. 2016 IEEE TRUSTCOM/BIGDATASE/ISPAnull. 2016, 937-940, [29] 乔延臣, 云晓春, 张永铮, 李书豪. 基于调用习惯的恶意代码自动化同源判定方法. 电子学报[J]. 2016, 44(10): 2410-2414, http://lib.cqvip.com/Qikan/Article/Detail?id=670515772.
[30] Wang Yipeng, Yun Xiaochun, Zhang Yongzheng, IEEE. Rethinking Robust and Accurate Application Protocol Identification: A Nonparametric Approach. 2015 IEEE 23RD INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP)null. 2015, 134-144, [31] Zhang, XiaoYu, Wang, Shupeng, Yun, Xiaochun. Bidirectional active learning: a two-way exploration into unlabeled and labeled dataset. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (TNNLS)[J]. 2015, 26(12): 3034-3044, https://www.webofscience.com/wos/woscc/full-record/WOS:000365312800006.
[32] Yun, Xiaochun, Wu, Guangjun, Zhang, Guangyan, Li, Keqin, Wang, Shupeng. FastRAQ: A Fast Approach to Range-Aggregate Queries in Big Data Environments. IEEE TRANSACTIONS ON CLOUD COMPUTING[J]. 2015, 3(2): 206-218, https://www.webofscience.com/wos/woscc/full-record/WOS:000366167500011.
[33] 徐小琳, 云晓春, 周勇林, 康学斌. 基于特征聚类的海量恶意代码在线自动分析模型. 通信学报[J]. 2013, 34(8): 146-153, http://lib.cqvip.com/Qikan/Article/Detail?id=46897717.
[34] 王风宇, 曹首峰, 肖军, 云晓春, 龚斌. 一种基于Web群体外联行为的应用层DDoS检测方法. 软件学报[J]. 2013, 24(6): 1263-1273, http://lib.cqvip.com/Qikan/Article/Detail?id=45890373.
[35] Zou, QingXin, Hao, ZhiYu, Cui, Xu, Yun, XiaoChun, Zhang, YongZheng, IEEE. Counting Sort for the Live Migration of Virtual Machines. 2013 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING (CLUSTER)null. 2013, [36] 王一鹏, 云晓春, 张永铮, 李书豪. 基于主动学习和SVM方法的网络协议识别技术. 通信学报[J]. 2013, 34(10): 135-142, http://lib.cqvip.com/Qikan/Article/Detail?id=47672749.
[37] 李超, 王树鹏, 云晓春, 周晓阳, 陈明. 一种基于流水线的重复数据删除系统读性能优化方法. 计算机研究与发展[J]. 2013, 50(1): 90-100, http://lib.cqvip.com/Qikan/Article/Detail?id=44509953.
[38] 王风宇, 郭山清, 李亮雄, 云晓春. 一种高效率的大流提取方法. 计算机研究与发展[J]. 2013, 50(4): 731-740, http://lib.cqvip.com/Qikan/Article/Detail?id=45305190.
[39] 陈明, 王树鹏, 云晓春, 吴广君, 李超. FAIDA:一种快速精确的图像消冗方法. 计算机研究与发展[J]. 2013, 50(1): 101-110, http://lib.cqvip.com/Qikan/Article/Detail?id=44509958.
[40] 张永铮, 肖军, 云晓春, 王风宇. DDoS攻击检测和控制方法. 软件学报[J]. 2012, 23(8): 2058-2072, http://lib.cqvip.com/Qikan/Article/Detail?id=42822814.
[41] 李超, 周晓阳, 王树鹏, 云晓春. 基于二级索引的重复数据删除系统中性能相关参数的量化分析与研究. 计算机研究与发展[J]. 2012, 173-177, http://lib.cqvip.com/Qikan/Article/Detail?id=1003429580.
[42] 张永铮, 云晓春. 网络运行安全指数多维属性分类模型. 计算机学报[J]. 2012, 35(8): 1666-1674, http://lib.cqvip.com/Qikan/Article/Detail?id=43370080.
[43] 云晓春. IPv6推广应用成为必需 解决安全问题是重中之重. 世界电信[J]. 2012, 56-57, http://lib.cqvip.com/Qikan/Article/Detail?id=42891400.
[44] Wang, Yipeng, Yun, Xiaochun, Shafiq, M Zubair, Wang, Liyan, Liu, Alex X, Zhang, Zhibin, Yao, Danfeng Daphne, Zhang, Yongzheng, Guo, Li, IEEE. A Semantics Aware Approach to Automated Reverse Engineering Unknown Protocols. 2012 20TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP)null. 2012, [45] 云晓春. 僵尸网络关系云模型分析方法. 武汉大学学报(信息科学版). 2012, [46] 王永建, 许俊峰, 周渊, 云晓春. 恶劣电力线信道中的SOQPSK-MIL调制方法. 南京理工大学学报:自然科学版[J]. 2012, 36(1): 61-65, http://lib.cqvip.com/Qikan/Article/Detail?id=41131239.
[47] 肖军, 云晓春, 张永铮. 随机伪造源地址分布式拒绝服务攻击过滤. 软件学报[J]. 2011, 22(10): 2425-2437, http://lib.cqvip.com/Qikan/Article/Detail?id=39399600.
[48] 肖军, 云晓春, 张永铮. 基于时延的Flash Crowd控制模型. 软件学报[J]. 2011, 22(11): 2795-2809, http://lib.cqvip.com/Qikan/Article/Detail?id=39723977.
[49] 臧天宁, 云晓春, 张永铮, 门朝光, 孙建亮. 网络设备协同联动模型. 计算机学报[J]. 2011, 34(2): 216-228, http://lib.cqvip.com/Qikan/Article/Detail?id=36835621.
[50] 孙建亮, 张永铮, 云晓春. 一个通用的网络安全协同联动体系模型. 计算机工程[J]. 2011, 37(13): 128-131, http://lib.cqvip.com/Qikan/Article/Detail?id=38631940.
[51] 肖军, 云晓春, 张永铮. 基于会话异常度模型的应用层分布式拒绝服务攻击过滤. 计算机学报[J]. 2010, 1713-1724, http://lib.cqvip.com/Qikan/Article/Detail?id=35221499.
[52] 戴磊, 云晓春, 张永铮, 吴志刚. 一种基于TCM主动学习的P2P流识别技术. 高技术通讯[J]. 2010, 674-679, http://lib.cqvip.com/Qikan/Article/Detail?id=34790607.
[53] 云晓春. An Incremental Block-level Snapshot Indexing Algorithm using Multi-version Bitmaps. Information Technology Journal. 2010, [54] 吴广君, 云晓春, 方滨兴, 王树鹏, 余翔湛. HCSIM:一种长期高频Block-Level快照索引技术. 计算机学报[J]. 2009, 2080-2090, http://lib.cqvip.com/Qikan/Article/Detail?id=31781029.
[55] 云晓春. 网络安全若干技术难点初探. 信息网络安全[J]. 2008, 27-29, http://lib.cqvip.com/Qikan/Article/Detail?id=29035854.
[56] Hao, Zhiyu, Yun, Xiaochun, Zhang, Hongli. An Efficient Routing Mechanism in Network Simulation. SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL[J]. 2008, 84(10-11): 511-520, https://www.webofscience.com/wos/woscc/full-record/WOS:000260957200004.
[57] 郝志宇, 云晓春, 张宏莉. MTree_Nix网络模拟路由计算与查找策略. 电子学报[J]. 2008, 36(3): 477-481, http://lib.cqvip.com/Qikan/Article/Detail?id=26912877.
[58] 张永铮, 田志宏, 方滨兴, 云晓春. 求解网络风险传播问题的近似算法及其性能分析. 中国科学:E辑[J]. 2008, 38(8): 1157-1168, http://lib.cqvip.com/Qikan/Article/Detail?id=29080605.
[59] Wang, ShuPeng, Yun, XiaoChun, Yu, XiangZhan. Survivability and makespan driven scheduling algorithm for grid workflow applications. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING[J]. 2007, 23(4): 1299-1313, https://www.webofscience.com/wos/woscc/full-record/WOS:000248237300022.
[60] 张永铮, 方滨兴, 迟悦, 云晓春. 用于评估网络信息系统的风险传播模型. 软件学报[J]. 2007, 18(1): 137-145, http://lib.cqvip.com/Qikan/Article/Detail?id=23680175.
[61] 辛毅, 方滨兴, 贺龙涛, 云晓春, 李志东. 基于通信特征分析的蠕虫检测和特征提取方法的研究. 通信学报[J]. 2007, 28(12): 1-7, http://lib.cqvip.com/Qikan/Article/Detail?id=26223482.
[62] 云晓春. 预防为主建设网安体系. 中国教育网络[J]. 2006, 1-1, http://lib.cqvip.com/Qikan/Article/Detail?id=22493566.
[63] Zhang, YongZheng, Yun, XiaoChun, Fang, BinXing, Zhang, Tao. A mining method for computer vulnerability correlation. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL[J]. 2005, 1(1): 43-51, https://www.webofscience.com/wos/woscc/full-record/WOS:000242079300004.
[3] Hao, Zhiyu, Wang, Wei, Cui, Lei, Yun, Xiaochun, Ding, Zhenquan. iConSnap: An Incremental Continuous Snapshots System for Virtual Machines. IEEE TRANSACTIONS ON SERVICES COMPUTING[J]. 2022, 15(1): 539-550, http://dx.doi.org/10.1109/TSC.2019.2955700.
[4] Yun, Xiaochun, Xie, Jiang, Li, Shuhao, Zhang, Yongzheng, Sun, Peishuai. Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features. COMPUTERS & SECURITY[J]. 2022, 121: http://dx.doi.org/10.1016/j.cose.2022.102834.
[5] Zhenyu Cheng, Xiaochun Yun, Shuhao Li, Jinbu Geng, Rui Qin, Li Fan. DITA-NCG: Detecting Information Theft Attack Based on Node Communication Graph. ICCSnull. 2022, [6] Guangjun Wu, Xiaochun Yun, Yong Wang, BInbin Li. A Sketching Approach for Obtaining Real-Time Statistics Over Data Streams in Cloud. IEEE Transactions on Cloud Computing[J]. 2022, 10(2): 1462-1475, [7] Cui, Lei, Hao, Zhiyu, Jiao, Yang, Fei, Haiqiang, Yun, Xiaochun. VulDetector: Detecting Vulnerabilities Using Weighted Feature Graph Comparison. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2021, 16: 2004-2017, https://www.webofscience.com/wos/woscc/full-record/WOS:000613347100005.
[8] Zeng, Yuwei, Yun, Xiaochun, Chen, Xunxun, Li, Boquan, Tsang, Haiwei, Wang, Yipeng, Zang, Tianning, Zhang, Yongzheng. Finding disposable domain names: A linguistics-based stacking approach?. COMPUTER NETWORKS[J]. 2021, 184: http://dx.doi.org/10.1016/j.comnet.2020.107642.
[9] Peng, Yaqiong, Hao, Zhiyu, Yun, Xiaochun. Lock-Free Parallelization for Variance-Reduced Stochastic Gradient Descent on Streaming Data. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS[J]. 2020, 31(9): 2220-2231, http://dx.doi.org/10.1109/TPDS.2020.2987867.
[10] Yun, Xiaochun, Huang, Ji, Wang, Yipeng, Zang, Tianning, Zhou, Yuan, Zhang, Yongzheng. Khaos: An Adversarial Neural Network DGA With High Anti-Detection Ability. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2020, 15: 2225-2240, http://dx.doi.org/10.1109/TIFS.2019.2960647.
[11] Valeria V Krzhizhanovskaya, Gbor Zvodszky, Michael H Lees, Jack J Dongarra, Peter M A Sloot, Srgio Brissos, Joo Teixeira, Zhicheng Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Chengwei Peng. Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network. COMPUTATIONAL SCIENCE – ICCS 2020. 2020, 12139: 379-398, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7304021/.
[12] Valeria V Krzhizhanovskaya, Gbor Zvodszky, Michael H Lees, Jack J Dongarra, Peter M A Sloot, Srgio Brissos, Joo Teixeira, Xiaolin Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Jia Li. Challenge Collapsar (CC) Attack Traffic Detection Based on Packet Field Differentiated Preprocessing and Deep Neural Network. COMPUTATIONAL SCIENCE – ICCS 2020. 2020, 12139: 282-296, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7304042/.
[13] Xie, Jiang, Li, Shuhao, Yun, Xiaochun, Zhang, Yongzheng, Chang, Peng. HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics. COMPUTERS & SECURITY[J]. 2020, 96: http://dx.doi.org/10.1016/j.cose.2020.101923.
[14] 云晓春. Important Member Discovery of Attribution Trace based on Relevant Circle. CollaborateCom. 2019, [15] Li, Jia, Yun, Xiaochun, Tian, Mao, Xie, Jiang, Li, Shuhao, Zhang, Yongzheng, Zhou, Yu, IEEE. A Method of HTTP Malicious Traffic Detection on Mobile Networks. 2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC)null. 2019, [16] Liu, Zhicheng, Yun, Xiaochun, Zhang, Yongzheng, Wang, Yipeng, IEEE Comp Soc. CCGA: Clustering and Capturing Group Activities for DGA-based botnets detection. 2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019)null. 2019, 136-143, [17] 云晓春. MalShoot: Shooting Malicious Domains through Graph Embedding on passive DNS Data. CollaborateCom. 2018, [18] 云晓春. MalHunter: Performing a Timely Detection on Malicious Domains via a single DNS Query. The 2018 International Conference on Information and Communications Security. 2018, [19] 云晓春. 新形势下关键信息基础设施的安全保护. 信息安全与通信保密[J]. 2018, 27-32, http://lib.cqvip.com/Qikan/Article/Detail?id=676708505.
[20] 云晓春. 求同存异 维护秩序. 信息安全与通信保密[J]. 2017, 111-111, http://lib.cqvip.com/Qikan/Article/Detail?id=673699699.
[21] Wang, YiPeng, Yun, Xiaochun, Zhang, Yongzheng, Chen, Liwei, Zang, Tianning. Rethinking robust and accurate application protocol identification. COMPUTER NETWORKS[J]. 2017, 129: 64-78, http://dx.doi.org/10.1016/j.comnet.2017.09.006.
[22] Peng Chengwei, Yun Xiaochun, Zhang Yongzheng, Li Shuhao, Xiao Jun, IEEE. Discovering Malicious Domains through Alias-canonical Graph. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMSnull. 2017, 225-232, [23] Tuo, Yupeng, Yun, Xiaochun, Zhang, Yongzheng, IEEE. Towards Robust and Accurate Similar Trajectory Discovery: Weak-parametric Approaches. 2017 INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE (NAS)null. 2017, 21-30, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000427036600003.
[24] Zhang, Kai, Yun, Xiaochun, Zhang, XiaoYu, Zhu, Xiaobin, Li, Chao, Wang, Shupeng. Weighted hierarchical geographic information description model for social relation estimation. NEUROCOMPUTING (NEUCOM)[J]. 2016, 216: 554-560, http://dx.doi.org/10.1016/j.neucom.2016.08.030.
[25] Xiaochun Yun, Yipeng Wang, Yongzheng Zhang, Yu Zhou. A semantics-aware approach to the automated network protocol identification. IEEE / ACM TRANSACTIONS ON NETWORKING (TON). 2016, 24(1): http://kns.cnki.net/KCMS/detail/detail.aspx?QueryID=0&CurRec=1&recid=&FileName=SJCM6C390861B42A5B53635B5A2EF2760882&DbName=WWMERGEJ01&DbCode=WWME&yx=&pr=&URLID=&bsm=.
[26] Qiao, Yanchen, Yun, Xiaochun, Zhang, Yongzheng, IEEE. How to Automatically Identify the Homology of Different Malware?. 2016 IEEE TRUSTCOM/BIGDATASE/ISPAnull. 2016, 929-936, [27] Zhang Kai, Yun Xiaochun, Liang Jiguang, 张晓宇, Li Chao, Tian Bin. Retweeting behavior prediction using probabilistic matrix factorization. IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC)null. 2016, 1185-1192, [28] Qiao, Yanchen, Yun, Xiaochun, Zhang, Yongzheng, IEEE. Fast Reused Function Retrieval Method Based on Simhash and Inverted Index. 2016 IEEE TRUSTCOM/BIGDATASE/ISPAnull. 2016, 937-940, [29] 乔延臣, 云晓春, 张永铮, 李书豪. 基于调用习惯的恶意代码自动化同源判定方法. 电子学报[J]. 2016, 44(10): 2410-2414, http://lib.cqvip.com/Qikan/Article/Detail?id=670515772.
[30] Wang Yipeng, Yun Xiaochun, Zhang Yongzheng, IEEE. Rethinking Robust and Accurate Application Protocol Identification: A Nonparametric Approach. 2015 IEEE 23RD INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP)null. 2015, 134-144, [31] Zhang, XiaoYu, Wang, Shupeng, Yun, Xiaochun. Bidirectional active learning: a two-way exploration into unlabeled and labeled dataset. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (TNNLS)[J]. 2015, 26(12): 3034-3044, https://www.webofscience.com/wos/woscc/full-record/WOS:000365312800006.
[32] Yun, Xiaochun, Wu, Guangjun, Zhang, Guangyan, Li, Keqin, Wang, Shupeng. FastRAQ: A Fast Approach to Range-Aggregate Queries in Big Data Environments. IEEE TRANSACTIONS ON CLOUD COMPUTING[J]. 2015, 3(2): 206-218, https://www.webofscience.com/wos/woscc/full-record/WOS:000366167500011.
[33] 徐小琳, 云晓春, 周勇林, 康学斌. 基于特征聚类的海量恶意代码在线自动分析模型. 通信学报[J]. 2013, 34(8): 146-153, http://lib.cqvip.com/Qikan/Article/Detail?id=46897717.
[34] 王风宇, 曹首峰, 肖军, 云晓春, 龚斌. 一种基于Web群体外联行为的应用层DDoS检测方法. 软件学报[J]. 2013, 24(6): 1263-1273, http://lib.cqvip.com/Qikan/Article/Detail?id=45890373.
[35] Zou, QingXin, Hao, ZhiYu, Cui, Xu, Yun, XiaoChun, Zhang, YongZheng, IEEE. Counting Sort for the Live Migration of Virtual Machines. 2013 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING (CLUSTER)null. 2013, [36] 王一鹏, 云晓春, 张永铮, 李书豪. 基于主动学习和SVM方法的网络协议识别技术. 通信学报[J]. 2013, 34(10): 135-142, http://lib.cqvip.com/Qikan/Article/Detail?id=47672749.
[37] 李超, 王树鹏, 云晓春, 周晓阳, 陈明. 一种基于流水线的重复数据删除系统读性能优化方法. 计算机研究与发展[J]. 2013, 50(1): 90-100, http://lib.cqvip.com/Qikan/Article/Detail?id=44509953.
[38] 王风宇, 郭山清, 李亮雄, 云晓春. 一种高效率的大流提取方法. 计算机研究与发展[J]. 2013, 50(4): 731-740, http://lib.cqvip.com/Qikan/Article/Detail?id=45305190.
[39] 陈明, 王树鹏, 云晓春, 吴广君, 李超. FAIDA:一种快速精确的图像消冗方法. 计算机研究与发展[J]. 2013, 50(1): 101-110, http://lib.cqvip.com/Qikan/Article/Detail?id=44509958.
[40] 张永铮, 肖军, 云晓春, 王风宇. DDoS攻击检测和控制方法. 软件学报[J]. 2012, 23(8): 2058-2072, http://lib.cqvip.com/Qikan/Article/Detail?id=42822814.
[41] 李超, 周晓阳, 王树鹏, 云晓春. 基于二级索引的重复数据删除系统中性能相关参数的量化分析与研究. 计算机研究与发展[J]. 2012, 173-177, http://lib.cqvip.com/Qikan/Article/Detail?id=1003429580.
[42] 张永铮, 云晓春. 网络运行安全指数多维属性分类模型. 计算机学报[J]. 2012, 35(8): 1666-1674, http://lib.cqvip.com/Qikan/Article/Detail?id=43370080.
[43] 云晓春. IPv6推广应用成为必需 解决安全问题是重中之重. 世界电信[J]. 2012, 56-57, http://lib.cqvip.com/Qikan/Article/Detail?id=42891400.
[44] Wang, Yipeng, Yun, Xiaochun, Shafiq, M Zubair, Wang, Liyan, Liu, Alex X, Zhang, Zhibin, Yao, Danfeng Daphne, Zhang, Yongzheng, Guo, Li, IEEE. A Semantics Aware Approach to Automated Reverse Engineering Unknown Protocols. 2012 20TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP)null. 2012, [45] 云晓春. 僵尸网络关系云模型分析方法. 武汉大学学报(信息科学版). 2012, [46] 王永建, 许俊峰, 周渊, 云晓春. 恶劣电力线信道中的SOQPSK-MIL调制方法. 南京理工大学学报:自然科学版[J]. 2012, 36(1): 61-65, http://lib.cqvip.com/Qikan/Article/Detail?id=41131239.
[47] 肖军, 云晓春, 张永铮. 随机伪造源地址分布式拒绝服务攻击过滤. 软件学报[J]. 2011, 22(10): 2425-2437, http://lib.cqvip.com/Qikan/Article/Detail?id=39399600.
[48] 肖军, 云晓春, 张永铮. 基于时延的Flash Crowd控制模型. 软件学报[J]. 2011, 22(11): 2795-2809, http://lib.cqvip.com/Qikan/Article/Detail?id=39723977.
[49] 臧天宁, 云晓春, 张永铮, 门朝光, 孙建亮. 网络设备协同联动模型. 计算机学报[J]. 2011, 34(2): 216-228, http://lib.cqvip.com/Qikan/Article/Detail?id=36835621.
[50] 孙建亮, 张永铮, 云晓春. 一个通用的网络安全协同联动体系模型. 计算机工程[J]. 2011, 37(13): 128-131, http://lib.cqvip.com/Qikan/Article/Detail?id=38631940.
[51] 肖军, 云晓春, 张永铮. 基于会话异常度模型的应用层分布式拒绝服务攻击过滤. 计算机学报[J]. 2010, 1713-1724, http://lib.cqvip.com/Qikan/Article/Detail?id=35221499.
[52] 戴磊, 云晓春, 张永铮, 吴志刚. 一种基于TCM主动学习的P2P流识别技术. 高技术通讯[J]. 2010, 674-679, http://lib.cqvip.com/Qikan/Article/Detail?id=34790607.
[53] 云晓春. An Incremental Block-level Snapshot Indexing Algorithm using Multi-version Bitmaps. Information Technology Journal. 2010, [54] 吴广君, 云晓春, 方滨兴, 王树鹏, 余翔湛. HCSIM:一种长期高频Block-Level快照索引技术. 计算机学报[J]. 2009, 2080-2090, http://lib.cqvip.com/Qikan/Article/Detail?id=31781029.
[55] 云晓春. 网络安全若干技术难点初探. 信息网络安全[J]. 2008, 27-29, http://lib.cqvip.com/Qikan/Article/Detail?id=29035854.
[56] Hao, Zhiyu, Yun, Xiaochun, Zhang, Hongli. An Efficient Routing Mechanism in Network Simulation. SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL[J]. 2008, 84(10-11): 511-520, https://www.webofscience.com/wos/woscc/full-record/WOS:000260957200004.
[57] 郝志宇, 云晓春, 张宏莉. MTree_Nix网络模拟路由计算与查找策略. 电子学报[J]. 2008, 36(3): 477-481, http://lib.cqvip.com/Qikan/Article/Detail?id=26912877.
[58] 张永铮, 田志宏, 方滨兴, 云晓春. 求解网络风险传播问题的近似算法及其性能分析. 中国科学:E辑[J]. 2008, 38(8): 1157-1168, http://lib.cqvip.com/Qikan/Article/Detail?id=29080605.
[59] Wang, ShuPeng, Yun, XiaoChun, Yu, XiangZhan. Survivability and makespan driven scheduling algorithm for grid workflow applications. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING[J]. 2007, 23(4): 1299-1313, https://www.webofscience.com/wos/woscc/full-record/WOS:000248237300022.
[60] 张永铮, 方滨兴, 迟悦, 云晓春. 用于评估网络信息系统的风险传播模型. 软件学报[J]. 2007, 18(1): 137-145, http://lib.cqvip.com/Qikan/Article/Detail?id=23680175.
[61] 辛毅, 方滨兴, 贺龙涛, 云晓春, 李志东. 基于通信特征分析的蠕虫检测和特征提取方法的研究. 通信学报[J]. 2007, 28(12): 1-7, http://lib.cqvip.com/Qikan/Article/Detail?id=26223482.
[62] 云晓春. 预防为主建设网安体系. 中国教育网络[J]. 2006, 1-1, http://lib.cqvip.com/Qikan/Article/Detail?id=22493566.
[63] Zhang, YongZheng, Yun, XiaoChun, Fang, BinXing, Zhang, Tao. A mining method for computer vulnerability correlation. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL[J]. 2005, 1(1): 43-51, https://www.webofscience.com/wos/woscc/full-record/WOS:000242079300004.
科研活动
科研项目
(1) xxxxx,主持,国家级,2013-01--2013-06
(2) xxxxx,主持,国家级,2013-01--2013-06
(3) xxxxx,主持,国家级,2013-01--2013-06
(2) xxxxx,主持,国家级,2013-01--2013-06
(3) xxxxx,主持,国家级,2013-01--2013-06
参与会议
(1) Research of Network Vulnerability Analysis Based on Attack Capability Transfer,2012-10,Yong Wang, Xiao-chun Yun, Yongzheng Zhang
(2) A General Framework of Trojan Communication Detection Based on Network Traces,2012-06,[2] Shicong Li, Xiaochun Yun; Yongzheng Zhang
(3) Modeling Social Engineering Botnet Dynamics across Multiple Social Networks,2012-06,Shuhao Li, Xiaochun Yun, Zhiyu Hao
(4) CNSSA: A Comprehensive Network Security Situation Awareness System,2011-11,Rongrong Xi, Shuyuan Jin; Xiaochun Yun,
(5) A Propagation Model for Social Engineering Botnets in Social Networks,2011-10,Shuhao Li, Xiaochun Yun, Zhiyu Hao,
(6) Network Threat Assessment based on Alert Verification,2011-10,Rongrong Xi, Xiaochun Yun, Shuyuan Jin
(7) Cooperative Work Systems for the Security of Digital Computing Infrastructure,2010-12,Tianning Zang, Xiaochun Yun, Tianyi Zang,
(8) A Pseudo-Random Number Generator Based on LZSS,2010-03,Wei-ling Chang, Binxing Fang, Xiao-chun Yun
(9) A review of classification methods for network vulnerability,2009-10,Shuyuan Jin, Yong Wang, Xiang Cui, Xiao-chun Yun
(10) A Survey of Alert Fusion Techniques for Security Incident,2008-07,Tianning Zang, Xiao-chun Yun, Yongzheng Zhang
(11) Analyzing the Characteristics of Gnutella Overlays,2007-04,Yong Wang, Xiao-chun Yun, Yifei Li
(12) An Efficient Routing Mechanism in Network Simulation,2006-05,Zhiyu Hao, Xiao-chun Yun, Hongli Zhang
(13) Assessment of Windows System Security Using Vulnerability Relationship Graph,2005-12,Yongzheng Zhang, Binxing Fang, Yue Chi and Xiaochun Yun
(2) A General Framework of Trojan Communication Detection Based on Network Traces,2012-06,[2] Shicong Li, Xiaochun Yun; Yongzheng Zhang
(3) Modeling Social Engineering Botnet Dynamics across Multiple Social Networks,2012-06,Shuhao Li, Xiaochun Yun, Zhiyu Hao
(4) CNSSA: A Comprehensive Network Security Situation Awareness System,2011-11,Rongrong Xi, Shuyuan Jin; Xiaochun Yun,
(5) A Propagation Model for Social Engineering Botnets in Social Networks,2011-10,Shuhao Li, Xiaochun Yun, Zhiyu Hao,
(6) Network Threat Assessment based on Alert Verification,2011-10,Rongrong Xi, Xiaochun Yun, Shuyuan Jin
(7) Cooperative Work Systems for the Security of Digital Computing Infrastructure,2010-12,Tianning Zang, Xiaochun Yun, Tianyi Zang,
(8) A Pseudo-Random Number Generator Based on LZSS,2010-03,Wei-ling Chang, Binxing Fang, Xiao-chun Yun
(9) A review of classification methods for network vulnerability,2009-10,Shuyuan Jin, Yong Wang, Xiang Cui, Xiao-chun Yun
(10) A Survey of Alert Fusion Techniques for Security Incident,2008-07,Tianning Zang, Xiao-chun Yun, Yongzheng Zhang
(11) Analyzing the Characteristics of Gnutella Overlays,2007-04,Yong Wang, Xiao-chun Yun, Yifei Li
(12) An Efficient Routing Mechanism in Network Simulation,2006-05,Zhiyu Hao, Xiao-chun Yun, Hongli Zhang
(13) Assessment of Windows System Security Using Vulnerability Relationship Graph,2005-12,Yongzheng Zhang, Binxing Fang, Yue Chi and Xiaochun Yun
指导学生
已指导学生
王风宇 博士研究生 081202-计算机软件与理论
王勇 博士研究生 081201-计算机系统结构
戴磊 博士研究生 081201-计算机系统结构
肖军 博士研究生 081220-信息安全
王勇 博士研究生 081220-信息安全
王曦 硕士研究生 081220-信息安全
孙建亮 硕士研究生 081220-信息安全
李书豪 博士研究生 081220-信息安全
周晓阳 硕士研究生 081220-信息安全
费海强 硕士研究生 081220-信息安全
李世淙 博士研究生 081220-信息安全
韦永隆 硕士研究生 081220-信息安全
现指导学生
席荣荣 博士研究生 081220-信息安全
徐小琳 博士研究生 081220-信息安全
李超 博士研究生 081220-信息安全
王一鹏 博士研究生 081220-信息安全
乔治 博士研究生 081220-信息安全
邹庆欣 博士研究生 081220-信息安全
尹喜 博士研究生 081220-信息安全
臧文羽 博士研究生 081220-信息安全
乔延臣 博士研究生 081220-信息安全
王勇 博士研究生 081220-信息安全
庹宇鹏 博士研究生 081220-信息安全
刘阳 博士研究生 081220-信息安全
朱海龙 博士研究生 081220-信息安全
丁杰 硕士研究生 081201-计算机系统结构
李佳 博士研究生 0812Z1-信息安全
袁庆升 博士研究生 0812Z1-信息安全