发表论文
[1] 谢一博, 苟高鹏, 熊刚, 李镇, 夏葳. DomEye: Detecting network covert channel of domain fronting with throughput fluctuation. Computers & Security[J]. 2024, 第 2 作者Volume 144(null): https://www.sciencedirect.com/science/article/abs/pii/S0167404824002815.[2] Gu, Zheyuan, Gou, Gaopeng, Liu, Chang, Yang, Chen, Zhang, Xiyuan, Li, Zhen, Xiong, Gang. Let gambling hide nowhere: Detecting illegal mobile gambling apps via heterogeneous graph-based encrypted traffic analysis. COMPUTER NETWORKS[J]. 2024, 第 2 作者 通讯作者 243: http://dx.doi.org/10.1016/j.comnet.2024.110278.[3] Meng Shen, Gaopeng Gou, Qi Xuan. Security and privacy of blockchain. 区块链研究(英文)[J]. 2023, 第 2 作者4(1): 100130, http://lib.cqvip.com/Qikan/Article/Detail?id=7109436572.[4] Jiang, Minghao, Cui, Mingxin, Liu, Chang, Gou, Gaopeng, Xiong, Gang, Li, Zhen. Zero-relabelling mobile-app identification over drifted encrypted network traffic. COMPUTER NETWORKS[J]. 2023, 第 4 作者228: http://dx.doi.org/10.1016/j.comnet.2023.109728.[5] Yuan, Qingjun, Liu, Chang, Yu, Wentao, Zhu, Yuefei, Xiong, Gang, Wang, Yongjuan, Gou, Gaopeng. BoAu: Malicious traffic detection with noise labels based on boundary augmentation. COMPUTERS & SECURITY[J]. 2023, 第 7 作者 通讯作者 131: http://dx.doi.org/10.1016/j.cose.2023.103300.[6] Guan, Zhong, Liu, Chang, Xiong, Gang, Li, Zhen, Gou, Gaopeng. FlowTracker: Improved flow correlation attacks with denoising and contrastive learning. COMPUTERS & SECURITY[J]. 2023, 第 5 作者125: http://dx.doi.org/10.1016/j.cose.2022.103018.[7] Yuan, Qingjun, Zhu, Yuefei, Xiong, Gang, Wang, Yongjuan, Yu, Wentao, Lu, Bin, Gou, Gaopeng. ULDC: Unsupervised Learning-Based Data Cleaning for Malicious Traffic With High Noise. COMPUTER JOURNAL. 2023, 第 7 作者 通讯作者 http://dx.doi.org/10.1093/comjnl/bxad036.[8] 谢一博, 苟高鹏, 熊刚, 李镇, 崔明鑫. Covertness Analysis of Snowflake Proxy Request. 2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD). 2023, 第 2 作者https://ieeexplore.ieee.org/abstract/document/10152736.[9] 谢一博, 苟高鹏, 熊刚, 李镇, 崔明鑫. Analysing Covertness of Tor Bridge Request. ICC 2023-IEEE International Conference on Communications. 2023, 第 2 作者https://ieeexplore.ieee.org/abstract/document/10152736.[10] 蒋明昊, 崔明鑫, 侯承尚, 蔡玮, 李镇, 熊刚, 苟高鹏. FA-Net: More Accurate Encrypted Network Traffic Classification Based on Burst with Self-Attention. 2023 International Joint Conference on Neural Networks (IJCNN). 2023, 第 7 作者https://ieeexplore.ieee.org/abstract/document/10191615.[11] 李韵锋, 苟高鹏, 熊刚, 李镇, 崔明鑫. The Potential Utility of Image Descriptions: User Identity Linkage across Social Networks Based on MultiModal Self-Attention Fusion. 2023 IEEE International Performance, Computing, and Communications Conference (IPCCC). 2023, 第 2 作者https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10253842.[12] 乐民生, 李镇, 刘畅, 苟高鹏, 熊刚, 夏葳. FedMP: Robust and Communication-Efficient Federated Multi-Prototype Intrusion Detection Framework in IoT. 2023 IEEE 29th International Conference on Parallel and Distributed Systems (ICPADS). 2023, 第 4 作者null(null): https://ieeexplore.ieee.org/abstract/document/10475978.[13] 王炳旭, 管洋洋, 苟高鹏, 扶佩佩, 李镇, 杨青娅, 刘畅. MTBD: HTTPS Tunnel Detection Based on Multi-Dimension Traffic Behaviors Decision. HPCC 2022. 2022, 第 3 作者null(null): [14] 朱智燊, 石俊峥, 王冲华, 熊刚, 郝志强, 苟高鹏. MCFM:Discover Sensitive Behavior from Encrypted Traffic in Industrial Control System. IEEE International Conference on Trust, Security and Privacy in Computing and Communications. 2022, 第 6 作者 通讯作者 [15] 王炳旭, 李镇, 苟高鹏, 扶佩佩, 熊刚, 秦颖超. A Two-stage Method for Fine-grained DNS Covert Tunnel Behavior Detection. International Conference on Science of Cyber Security. 2022, 第 3 作者[16] 赵晨, 丁嘉宁, 李真真, 李镇, 熊刚, 苟高鹏. Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics. Australasian Conference on Information Security and Privacy. 2022, 第 6 作者 通讯作者 [17] Lin, Xinjie, Liu, Han, Li, Zhen, Xiong, Gang, Gou, Gaopeng. Privacy protection of China's top websites: A Multi-layer privacy measurement via network behaviours and privacy policies. COMPUTERS & SECURITY[J]. 2022, 第 5 作者 通讯作者 114: http://dx.doi.org/10.1016/j.cose.2022.102606.[18] 崔天宇, 熊刚, 刘畅, 石俊峥, 扶佩佩, 苟高鹏. GALG:Linking Addresses in Tracking Ecosystem Using Graph Autoencoder with Link Generation. The European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases. 2022, 第 6 作者[19] 林鑫杰, 熊刚, 苟高鹏, 石俊峥, 于静. ET-BERT: A Contextualized Datagram Representation with Pre-training Transformers for Encrypted Traffic Classification. WWW[J]. 2022, 第 3 作者[20] 管中, 刘畅, 熊刚, 李镇, 苟高鹏. FlowTracker: Improved flow correlation attacks with denoising and contrastive learning. Computers & Security[J]. 2022, 第 5 作者[21] Jiang, Minghao, Li, Zhen, Fu, Peipei, Cai, Wei, Cui, Mingxin, Xiong, Gang, Gou, Gaopeng. Accurate mobile-app fingerprinting using flow-level relationship with graph neural networks. COMPUTER NETWORKS[J]. 2022, 第 7 作者 通讯作者 217: http://dx.doi.org/10.1016/j.comnet.2022.109309.[22] 扶佩佩, 杨青娅, 管洋洋, 王炳旭, 苟高鹏, 李镇, 熊刚, 李真真. Towards Multi-source Extension: A Multi-classification Method Based on Sampled NetFlow Records. TrustCom 2021. 2021, 第 5 作者null(null): [23] 管中, 熊刚, 苟高鹏, 李镇, 崔明鑫, 刘畅. BAPM:Block Attention Profiling Model for Multi tab Website Fingerprinting Attacks on Tor. Proceedings of the 37th Annual Computer Security Applications Conference. 2021, 第 3 作者https://dl.acm.org/doi/abs/10.1145/3485832.3485891.[24] 田婧, 苟高鹏, 管洋洋, 夏葳, 熊刚, 刘畅. A Study on Security Analysis of the Unlinkability in Tor. MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM). 2021, 第 2 作者null(null): https://ieeexplore.ieee.org/abstract/document/9653038.[25] 夏葳, 李真真, 李镇, 熊刚, 苟高鹏. EthSniffer: A Global Passive Perspective on Ethereum. International Conference on Blockchain and Trustworthy Systems. 2021, 第 5 作者null(null): https://link.springer.com/chapter/10.1007/978-981-16-7993-3_6.[26] 夏葳, 王伟, 贺欣, 熊刚, 苟高鹏, 李真真, 李镇. Old Habits Die Hard: A Sober Look at TLS Client Certificates in the Real World. 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 2021, 第 5 作者null(null): https://ieeexplore.ieee.org/abstract/document/9724395.[27] 管洋洋, 夏葳, 苟高鹏, 扶佩佩, 王炳旭, 李镇. Large-Scale Measurement of Encrypted TLS Server Name Indication (ESNI): How Far Have We Come?. 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys). 2021, 第 3 作者null(null): https://ieeexplore.ieee.org/abstract/document/9780903.[28] Jie Chen, Gaopeng Gou, Gang Xiong. An Analysis of Anomalous User Agent Strings in Network Traffic. 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems : Volume 3 of 4.. 2021, 第 2 作者1771-1778, [29] Liu, Chang, Xiong, Gang, Gou, Gaopeng, Yiu, SiuMing, Li, Zhen, Tian, Zhihong. Classifying encrypted traffic using adaptive fingerprints with multi-level attributes. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS[J]. 2021, 第 3 作者 通讯作者 24(6): 2071-2097, http://dx.doi.org/10.1007/s11280-021-00940-0.[30] Wang, Yu, Gou, Gaopeng, Liu, Chang, Cui, Mingxin, Li, Zhen, Xiong, Gang. Survey of security supervision on blockchain from the perspective of technology. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS[J]. 2021, 第 2 作者60: http://dx.doi.org/10.1016/j.jisa.2021.102859.[31] 李真真, 夏葳, 崔明鑫, 扶佩佩, 苟高鹏, 熊刚. Mining the Characteristics of the Ethereum P2P Network. Mining the Characteristics of the Ethereum P2P Network. 2020, 第 5 作者null(null): https://dl.acm.org/doi/abs/10.1145/3384943.3409418.[32] 扶佩佩, 刘畅, 杨青娅, 李真真, 苟高鹏, 熊刚, 李镇. NSA-Net: A NetFlow Sequence Attention Network for Virtual Private Network Traffic Detection. WISE 2020. 2020, 第 5 作者null(null): [33] Tian, Jing, Gou, Gaopeng, Liu, Chang, Chen, Yige, Xiong, Gang, Li, Zhen, Zhou, J, Luo, X, Shen, Q, Xu, Z. DLchain: A Covert Channel over Blockchain Based on Dynamic Labels. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019). 2020, 第 2 作者 通讯作者 11999: 814-830, [34] Shi, Junzheng, Yang, Qingya, Gou, Gaopeng, Xiong, Gang, Assoc Comp Machinery. An Quick Available-Bandwidth Measurement Method Based on Link Delay Growth Rate. ICCBN 2020: 2020 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND BROADBAND NETWORKING / ICCET 2020: 2020 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND TECHNOLOGY. 2020, 第 3 作者51-57, http://dx.doi.org/10.1145/3390525.3390531.[35] Hou, Chengshang, Gou, Gaopeng, Xiong, Gang, Li, Zhen, IEEE. Joint Analysis of Port and Protocol via Endpoint Measurement: An Empirical Study. APNOMS 2020: 2020 21ST ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS). 2020, 第 2 作者231-234, [36] Tian, Jing, Xiong, Gang, Li, Zhen, Gou, Gaopeng. A Survey of Key Technologies for Constructing Network Covert Channel. SECURITY AND COMMUNICATION NETWORKS. 2020, 第 4 作者 通讯作者 2020: https://doaj.org/article/8cbed37edb634c449b929fef69bb9726.[37] Cui Tianyu, Xiong Gang, Gou Gaopeng, Shi Junzheng, Xia Wei. 6VecLM: Language Modeling in Vector Space for IPv6 Target Generation. 2020, 第 3 作者http://arxiv.org/abs/2008.02213.[38] Cui, Tianyu, Gou, Gaopeng, Xiong, Gang, Lauw, HW, Wong, RCW, Ntoulas, A, Lim, EP, Ng, SK, Pan, SJ. 6GCVAE: Gated Convolutional Variational Autoencoder for IPv6 Target Generation. ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2020, PT I. 2020, 第 2 作者 通讯作者 12084: 609-622, [39] Guo, Yu, Li, Zhenzhen, Li, Zhen, Xiong, Gang, Jiang, Minghao, Gou, Gaopeng, IEEE. FLAGB: Focal Loss based Adaptive Gradient Boosting for Imbalanced Traffic Classification. 2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN). 2020, 第 6 作者 通讯作者 [40] Fan, Xinlei, Gou, Gaopeng, Kang, Cuicui, Shi, Junzheng, Xiong, Gang, IEEE. Identify OS from encrypted traffic with TCP/IP stack fingerprinting. 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC). 2019, 第 2 作者[41] Jiang, Minghao, Gou, Gaopeng, Shi, Junzheng, Xiong, Gang, IEEE. I Know What You Are Doing With Remote Desktop. 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC). 2019, 第 2 作者[42] Guan, Zhong, Gou, Gaopeng, Guan, Yangyang, Wang, Bingxu, IEEE. An Empirical Analysis of Plugin-Based Tor Traffic over SSH Tunnel. MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM). 2019, 第 2 作者[43] He, Wenxuan, Gou, Gaopeng, Kang, Cuicui, Liu, Chang, Li, Zhen, Xiong, Gang, IEEE. Malicious Domain Detection via Domain Relationship and Graph Models. 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC). 2019, 第 2 作者[44] Liang, Kaiqi, Gou, Gaopeng, Kang, Cuicui, Liu, Chang, Yang, Min, Guo, Yu, IEEE. A Multi-view Deep Learning Model For Encrypted Website Service Classification. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM). 2019, 第 2 作者 通讯作者 [45] Cui, Tianyu, Liu, Chang, Gou, Gaopeng, Shi, Junzheng, Xiong, Gang, IEEE. A Comprehensive Study of Accelerating IPv6 Deployment. 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC). 2019, 第 3 作者[46] Yang Ying, Kang Cuicui, Gou Gaopeng, Li Zhen, Xiong Gang, IEEE. TLS/SSL Encrypted Traffic Classification with Autoencoder and Convolutional Neural Network. IEEE 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS / IEEE 16TH INTERNATIONAL CONFERENCE ON SMART CITY / IEEE 4TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS). 2018, 第 3 作者362-369, http://dx.doi.org/10.1109/HPCC/SmartCity/DSS.2018.00079.[47] Li, Longxi, Gou, Gaopeng, Xiong, Gang, Cao, Zigang, Li, Zhen, Jiang, S, Zeng, B, Huang, Q, ElSaddik, A, Li, H, Fan, X. Identifying Gambling and Porn Websites with Image Recognition. ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2017, PT II. 2018, 第 2 作者10736: 488-497, [48] Liu, Chang, Cao, Zigang, Xiong, Gang, Gou, Gaopeng, Yiu, SiuMing, He, Longtao, IEEE. MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints. 2018 IEEE/ACM 26TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS). 2018, 第 4 作者http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000461354300006.[49] Gou Gaopeng, Li Zhen, Xiong Gang, Guan Yangyang, Shi Junzheng, Koumoutsakos P, Lees M, Krzhizhanovskaya V, Dongarra J, Sloot P. Video face recognition through multi-scale and optimization of margin distributions. INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE (ICCS 2017). 2017, 第 1 作者108: 2458-2462, http://dx.doi.org/10.1016/j.procs.2017.05.058.[50] Gou, Gaopeng, Bai, Quan, Xiong, Gang, Li, Zhenzhen. Discovering abnormal behaviors via HTTP header fields measurement. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE[J]. 2017, 第 1 作者29(20): https://www.webofscience.com/wos/woscc/full-record/WOS:000411486900008.[51] Chen Yang, Gang Xiong, Qing Zhang, Junzheng Shi, Gaopeng Gou, Zhen Li, Chang Liu. Few-shot encrypted traffic classification via multi-task representation enhanced meta-learning. COMPUTER NETWORKS. 第 5 作者http://dx.doi.org/10.1016/j.comnet.2023.109731.