发表论文
[1] Yuan, Qingjun, Liu, Chang, Yu, Wentao, Zhu, Yuefei, Xiong, Gang, Wang, Yongjuan, Gou, Gaopeng. BoAu: Malicious traffic detection with noise labels based on boundary augmentation. COMPUTERS & SECURITY[J]. 2023, 131: http://dx.doi.org/10.1016/j.cose.2023.103300.[2] Yuan, Qingjun, Zhu, Yuefei, Xiong, Gang, Wang, Yongjuan, Yu, Wentao, Lu, Bin, Gou, Gaopeng. ULDC: Unsupervised Learning-Based Data Cleaning for Malicious Traffic With High Noise. COMPUTER JOURNAL. 2023, http://dx.doi.org/10.1093/comjnl/bxad036.[3] 朱智燊, 石俊峥, 王冲华, 熊刚, 郝志强, 苟高鹏. MCFM:Discover Sensitive Behavior from Encrypted Traffic in Industrial Control System. IEEE International Conference on Trust, Security and Privacy in Computing and Communicationsnull. 2022, [4] 王炳旭, 李镇, 苟高鹏, 扶佩佩, 熊刚, 秦颖超. A Two-stage Method for Fine-grained DNS Covert Tunnel Behavior Detection. International Conference on Science of Cyber Securitynull. 2022, [5] 郭敬宇, 崔明鑫, 侯承尚, 苟高鹏, 李镇, 熊刚, 刘畅. Global-Aware Prototypical Network for Few-Shot Encrypted Traffic Classification. IFIP International Conferences on Networkingnull. 2022, [6] Li, Sijia, Gou, Gaopeng, Liu, Chang, Hou, Chengshang, Li, Zhenzhen, Xiong, Gang. TTAGN: Temporal Transaction Aggregation Graph Network for Ethereum Phishing Scams Detection. 2022, [7] 赵晨, 丁嘉宁, 李真真, 李镇, 熊刚, 苟高鹏. Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics. Australasian Conference on Information Security and Privacynull. 2022, [8] Lin, Xinjie, Liu, Han, Li, Zhen, Xiong, Gang, Gou, Gaopeng. Privacy protection of China's top websites: A Multi-layer privacy measurement via network behaviours and privacy policies. COMPUTERS & SECURITY[J]. 2022, 114: http://dx.doi.org/10.1016/j.cose.2022.102606.[9] 崔天宇, 熊刚, 刘畅, 石俊峥, 扶佩佩, 苟高鹏. GALG:Linking Addresses in Tracking Ecosystem Using Graph Autoencoder with Link Generation. The European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databasesnull. 2022, [10] 林鑫杰, 熊刚, 苟高鹏, 石俊峥, 于静. ET-BERT: A Contextualized Datagram Representation with Pre-training Transformers for Encrypted Traffic Classification. WWW[J]. 2022, [11] 管中, 刘畅, 熊刚, 李镇, 苟高鹏. FlowTracker: Improved flow correlation attacks with denoising and contrastive learning. Computers & Security[J]. 2022, [12] Jiang, Minghao, Li, Zhen, Fu, Peipei, Cai, Wei, Cui, Mingxin, Xiong, Gang, Gou, Gaopeng. Accurate mobile-app fingerprinting using flow-level relationship with graph neural networks. COMPUTER NETWORKS[J]. 2022, 217: http://dx.doi.org/10.1016/j.comnet.2022.109309.[13] Zhao, Zhendong, Chen, Xiaojun, Wang, Dakui, Xuan, Yuexin, Xiong, Gang. Robust node embedding against graph structural perturbations. INFORMATION SCIENCES[J]. 2021, 566: 165-177, http://dx.doi.org/10.1016/j.ins.2021.02.046.[14] Liu, Chang, Xiong, Gang, Gou, Gaopeng, Yiu, SiuMing, Li, Zhen, Tian, Zhihong. Classifying encrypted traffic using adaptive fingerprints with multi-level attributes. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS[J]. 2021, 24(6): 2071-2097, http://dx.doi.org/10.1007/s11280-021-00940-0.[15] Wang, Yu, Gou, Gaopeng, Liu, Chang, Cui, Mingxin, Li, Zhen, Xiong, Gang. Survey of security supervision on blockchain from the perspective of technology. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS[J]. 2021, 60: http://dx.doi.org/10.1016/j.jisa.2021.102859.[16] Tian, Jing, Gou, Gaopeng, Liu, Chang, Chen, Yige, Xiong, Gang, Li, Zhen, Zhou, J, Luo, X, Shen, Q, Xu, Z. DLchain: A Covert Channel over Blockchain Based on Dynamic Labels. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019)null. 2020, 11999: 814-830, [17] Shi, Junzheng, Yang, Qingya, Gou, Gaopeng, Xiong, Gang, Assoc Comp Machinery. An Quick Available-Bandwidth Measurement Method Based on Link Delay Growth Rate. ICCBN 2020: 2020 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND BROADBAND NETWORKING / ICCET 2020: 2020 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND TECHNOLOGYnull. 2020, 51-57, http://dx.doi.org/10.1145/3390525.3390531.[18] Hou, Chengshang, Gou, Gaopeng, Xiong, Gang, Li, Zhen, IEEE. Joint Analysis of Port and Protocol via Endpoint Measurement: An Empirical Study. APNOMS 2020: 2020 21ST ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS)null. 2020, 231-234, [19] Tian, Jing, Xiong, Gang, Li, Zhen, Gou, Gaopeng. A Survey of Key Technologies for Constructing Network Covert Channel. SECURITY AND COMMUNICATION NETWORKSnull. 2020, 2020: https://doaj.org/article/8cbed37edb634c449b929fef69bb9726.[20] Guo, Yu, Li, Zhenzhen, Li, Zhen, Xiong, Gang, Jiang, Minghao, Gou, Gaopeng, IEEE. FLAGB: Focal Loss based Adaptive Gradient Boosting for Imbalanced Traffic Classification. 2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN)null. 2020, [21] Fan, Xinlei, Gou, Gaopeng, Kang, Cuicui, Shi, Junzheng, Xiong, Gang, IEEE. Identify OS from encrypted traffic with TCP/IP stack fingerprinting. 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC)null. 2019, [22] Jiang, Minghao, Gou, Gaopeng, Shi, Junzheng, Xiong, Gang, IEEE. I Know What You Are Doing With Remote Desktop. 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC)null. 2019, [23] He, Wenxuan, Gou, Gaopeng, Kang, Cuicui, Liu, Chang, Li, Zhen, Xiong, Gang, IEEE. Malicious Domain Detection via Domain Relationship and Graph Models. 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC)null. 2019, [24] Wang Hai, Wang Yong, Cao Zigang, Li Zhen, Xiong Gang, Yun X, Wen W, Lang B, Yan H, Ding L, Li J, Zhou Y. An Overview of Blockchain Security Analysis. CYBER SECURITY, CNCERT 2018null. 2019, 970: 55-72, [25] Liu Chang, He Longtao, Xiong Gang, Cao Zigang, Li Zhen, IEEE. FS-Net: A How Sequence Network For Encrypted Traffic Classification. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019)null. 2019, 1171-1179, [26] Zhang, Ziqing, Karig, Cuicui, Xiong, Gang, Li, Zhen, ACM. Deep Forest with LRRS Feature for Fine-grained Website Fingerprinting with Encrypted SSL/TLS. PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM '19)null. 2019, 851-860, http://dx.doi.org/10.1145/3357384.3357993.[27] Cui, Tianyu, Liu, Chang, Gou, Gaopeng, Shi, Junzheng, Xiong, Gang, IEEE. A Comprehensive Study of Accelerating IPv6 Deployment. 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC)null. 2019, [28] Wang, Jibao, Cao, Zigang, Kang, Cuicui, Xiong, Gang, IEEE. User Behavior Classification in Encrypted Cloud Camera Traffic. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM)null. 2019, [29] Yang Ying, Kang Cuicui, Gou Gaopeng, Li Zhen, Xiong Gang, IEEE. TLS/SSL Encrypted Traffic Classification with Autoencoder and Convolutional Neural Network. IEEE 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS / IEEE 16TH INTERNATIONAL CONFERENCE ON SMART CITY / IEEE 4TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS)null. 2018, 362-369, http://dx.doi.org/10.1109/HPCC/SmartCity/DSS.2018.00079.[30] Liu, Chang, Cao, Zigang, Li, Zhen, Xiong, Gang, IEEE. LaFFT: Length-Aware FFT Based Fingerprinting for Encrypted Network Traffic Classification. 2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC)null. 2018, 20-25, [31] Gou, Gaopeng, Shi, Junzheng, Xiong, Gang, Fu, Peipei, Li, Zhen, Li, Zhenzhen, Jiang, S, Zeng, B, Huang, Q, ElSaddik, A, Li, H, Fan, X. Image-Set Based Collaborative Representation for Face Recognition in Videos. ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2017, PT IInull. 2018, 10736: 498-507, [32] Hou Chengshang, Shi Junzheng, Kang Cuicui, Cao Zigang, Gang Xiong, IEEE. Classifying User Activities in the Encrypted WeChat Traffic. 2018 IEEE 37TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC)null. 2018, [33] Cui, Mingxin, Cao, Zigang, Xiong, Gang, Shi, Y, Fu, H, Tian, Y, Krzhizhanovskaya, VV, Lees, MH, Dongarra, J, Sloot, PMA. How Is the Forged Certificates in the Wild: Practice on Large-Scale SSL Usage Measurement and Analysis. COMPUTATIONAL SCIENCE - ICCS 2018, PT IIInull. 2018, 10862: 654-667, [34] Li, Longxi, Gou, Gaopeng, Xiong, Gang, Cao, Zigang, Li, Zhen, Jiang, S, Zeng, B, Huang, Q, ElSaddik, A, Li, H, Fan, X. Identifying Gambling and Porn Websites with Image Recognition. ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2017, PT IInull. 2018, 10736: 488-497, [35] Zeng, Xudong, Kang, Cuicui, Shi, Junzheng, Li, Zhen, Xiong, Gang, Shi, Y, Fu, H, Tian, Y, Krzhizhanovskaya, VV, Lees, MH, Dongarra, J, Sloot, PMA. Old Habits Die Hard: Fingerprinting Websites on the Cloud. COMPUTATIONAL SCIENCE - ICCS 2018, PT IIInull. 2018, 10862: 499-511, [36] Liu, Chang, Cao, Zigang, Xiong, Gang, Gou, Gaopeng, Yiu, SiuMing, He, Longtao, IEEE. MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints. 2018 IEEE/ACM 26TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS)null. 2018, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000461354300006.[37] Liu, Chang, Zeng, Lingwu, Shi, Junzheng, Xu, Fei, Xiong, Gang, Yiu, S M, IEEE. Auto-identification of Background Traffic Based on Autonomous Periodic Interaction. 2017 IEEE 36TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC)null. 2017, [38] Gou Gaopeng, Li Zhen, Xiong Gang, Guan Yangyang, Shi Junzheng, Koumoutsakos P, Lees M, Krzhizhanovskaya V, Dongarra J, Sloot P. Video face recognition through multi-scale and optimization of margin distributions. INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE (ICCS 2017)null. 2017, 108: 2458-2462, http://dx.doi.org/10.1016/j.procs.2017.05.058.[39] Gou, Gaopeng, Bai, Quan, Xiong, Gang, Li, Zhenzhen. Discovering abnormal behaviors via HTTP header fields measurement. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE[J]. 2017, 29(20): https://www.webofscience.com/wos/woscc/full-record/WOS:000411486900008.[40] Cui Mingxin, Cao Zigang, Xiong Gang, Shi Junzheng, ACM. POSTER: A Comprehensive Study of Forged Certificates in the Wild. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITYnull. 2017, 2487-2489, http://dx.doi.org/10.1145/3133956.3138851.[41] Li, Zhen, Pan, Haiqing, Liu, Wenhao, Xu, Fei, Cao, Zigang, Xiong, Gang. A network attack forensic platform against HTTP evasive behavior. JOURNAL OF SUPERCOMPUTING[J]. 2017, 73(7): 3053-3064, https://www.webofscience.com/wos/woscc/full-record/WOS:000405297000014.[42] 丁嘉宁, 张鹏, 杨嵘, 刘俊朋, 刘庆云, 熊刚. 支持多租户的网络测试床模拟流量标记和溯源模型. 电子学报[J]. 2017, 45(8): 1947-1956, http://lib.cqvip.com/Qikan/Article/Detail?id=673054443.[43] Xu, Fei, Pan, Haiqing, Cao, Zigang, Li, Zhen, Xiong, Gang, Guan, Yangyang, Yiu, S M, IEEE. Identifying Malware with HTTP Content Type Inconsistency via Header-Payload Comparison. 2017 IEEE 36TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC)null. 2017, [44] Cai Zixi, Cao Zigang, Xiong Gang, Li Zhen, Xia Wei, ACM. POSTER: An Empirical Measurement Study on Multi-tenant Deployment Issues of CDNs. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITYnull. 2017, 2471-2473, http://dx.doi.org/10.1145/3133956.3138852.[45] Li Qian, Niu Wenjia, Li Gang, Tan Jianlong, Xiong Gang, Guo Li, IEEE. Riemannian Optimization with Subspace Tracking for Low-rank Recovery. 2016 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN)null. 2016, 3280-3287, [46] 赵宇飞, 熊刚, 贺龙涛, 李舟军. 面向网络环境的SQL注入行为检测方法. 通信学报[J]. 2016, 37(2): 2016034-1, http://lib.cqvip.com/Qikan/Article/Detail?id=668040330.[47] 喻思敏, 李镇, 熊刚. 一种基于数据层的BGP网络前缀分类研究. 信息网络安全[J]. 2015, 274-277, http://lib.cqvip.com/Qikan/Article/Detail?id=666205659.[48] 熊刚, 何慧敏, 于静, 刘燕兵, 郭莉. HybridFA:一种基于统计的AC自动机空间优化技术. 通信学报[J]. 2015, 36(7): 31-39, http://lib.cqvip.com/Qikan/Article/Detail?id=665529103.[49] Cao Zigang, Xiong Gang, Zhao Yong, Guo Li, Fang Binxing. Two-Phased Method for Detecting Evasive Network Attack Channels. CHINA COMMUNICATIONS[J]. 2014, 11(8): 47-58, http://lib.cqvip.com/Qikan/Article/Detail?id=661930200.[50] Zhang Yu, Xiong Gang, Liu Yanbing, Liu Mengya, Liu Ping, Guo Li, Chen L, Jia Y, Sellis T, Liu G. Delta-K-2-tree for Compact Representation of Web Graphs. WEB TECHNOLOGIES AND APPLICATIONS, APWEB 2014null. 2014, 8709: 270-281, [51] 曹自刚, 熊刚, 赵咏. 基于X.509证书测量的隐私泄露分析. 计算机学报[J]. 2014, 37(1): 151-164, http://lib.cqvip.com/Qikan/Article/Detail?id=48544440.[52] Yu Hongliang, Zhao Yong, Xiong Gang, Guo Li, Li Zhen, Wang Yong, ACM. POSTER: Mining Elephant Applications in Unknown Traffic by Service Clustering. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITYnull. 2014, 1532-1534, http://dx.doi.org/10.1145/2660267.2662391.[53] CAO Zigang, XIONG Gang, ZHAO Yong, GUO Li, FANG Binxing. Two-Phased Method for Detecting Evasive Network Attack Channels. 中国通信:英文版[J]. 2014, 47-58, http://lib.cqvip.com/Qikan/Article/Detail?id=661930200.[54] 张宇, 刘燕兵, 熊刚, 贾焰, 刘萍, 郭莉. 图数据表示与压缩技术综述. 软件学报[J]. 2014, 25(9): 1937-1952, http://lib.cqvip.com/Qikan/Article/Detail?id=662039669.[55] 熊刚, 赵咏, 曹自刚. 基于主机行为关联的加密P2P流量实时分类方法. 高技术通讯[J]. 2013, 23(10): 1008-1015, http://lib.cqvip.com/Qikan/Article/Detail?id=47614033.[56] Song, Ming, Xiong, Gang, Li, Zhenzhen, Peng, Junrui, Guo, Li, IEEE. A De-anonymize attack method based on traffic analysis. 2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM)null. 2013, 455-460, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000330569800085.[57] 熊刚. 基于流分析的加密网络服务分类. 2013, [58] 王勇, 云晓春, 姚垚, 熊刚. DNSSEC域名解析的形式化描述及量化分析研究. 计算机研究与发展[J]. 2012, 55-63, http://lib.cqvip.com/Qikan/Article/Detail?id=1003429563.