发表论文
[1] 韩雪莹, 崔苏苏, 秦健, 刘松, 姜波, 董聪, 卢志刚, 刘宝旭. ContraMTD: An Unsupervised Malicious Network Traffic Detection Method based on Contrastive Learning. WWW '24: Proceedings of the ACM on Web Conference 2024. 2024, 第 7 作者null(null): https://dl.acm.org/doi/abs/10.1145/3589334.3645479.[2] 赵荻, 尹志超, 崔苏苏, 曹中华, 卢志刚. 基于图表示的恶意TLS流量检测方法. 信息安全研究[J]. 2024, 第 5 作者10(3): 209-215, http://lib.cqvip.com/Qikan/Article/Detail?id=7111535887.[3] Chen, Yiren, Cui, Mengjiao, Wang, Ding, Cao, Yiyang, Yang, Peian, Jiang, Bo, Lu, Zhigang, Liu, Baoxu. A survey of large language models for cyber threat detection. COMPUTERS & SECURITY[J]. 2024, 第 7 作者145(null): http://dx.doi.org/10.1016/j.cose.2024.104016.[4] 韩雪莹, 刘松, 刘俊荣, 姜波, 卢志刚, 刘宝旭. ECNet: Robust Malicious Network Traffic Detection with Multi-view Feature and Confidence Mechanism. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2024, 第 5 作者null(null): https://ieeexplore.ieee.org/document/10592040.[5] Xiao, Haitao, Zhu, Yan, Zhang, Bin, Lu, Zhigang, Du, Dan, Liu, Yuling. Unveiling shadows: A comprehensive framework for insider threat detection based on statistical and sequential analysis. COMPUTERS & SECURITY[J]. 2024, 第 4 作者138: http://dx.doi.org/10.1016/j.cose.2023.103665.[6] Wang, Qing, Dong, Cong, Jian, Shijie, Du, Dan, Lu, Zhigang, Qi, Yinhao, Han, Dongxu, Ma, Xiaobo, Wang, Fei, Liu, Yuling. HANDOM: Heterogeneous Attention Network Model for Malicious Domain Detection. COMPUTERS & SECURITY[J]. 2023, 第 5 作者125: http://dx.doi.org/10.1016/j.cose.2022.103059.[7] 秦健, 韩雪莹, 王冲华, 胡晴, 姜波, 张辰, 卢志刚. Network Traffic Classification Based on SDsampling and Hierarchical Ensemble Learning. Security and Communication Networks[J]. 2023, 第 7 作者2023: 1-16, https://www.hindawi.com/journals/scn/2023/4374385/.[8] Xueying Han, Susu Cui, Song Liu, Chen Zhang, Bo Jiang, Zhigang Lu. Network intrusion detection based on n-gram frequency and time-aware transformer. COMPUTERS & SECURITY[J]. 2023, 第 6 作者128: http://dx.doi.org/10.1016/j.cose.2023.103171.[9] Haitao Xiao, Chen Zhang, Song Liu, Bo Jiang, Zhigang Lu, Fei Wang, Yuling Liu. CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network. Security and Privacy in Communication Networks: 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings. 2023, 第 5 作者https://link.springer.com/chapter/10.1007/978-3-031-25538-0_4.[10] 崔苏苏, 董聪, 沈蒙, 刘玉岭, 姜波, 卢志刚. CBSeq: A Channel-Level Behavior Sequence for Encrypted Malware Traffic Detection. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2023, 第 6 作者18(2023): 5011-5025, https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10198353.[11] 蹇诗婕, 刘岳, 姜波, 卢志刚, 刘玉岭, 刘宝旭. 基于聚类过采样和自动编码器的网络入侵检测方法. 信息安全学报[J]. 2023, 第 4 作者8(6): 121-134, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=7611766&detailType=1.[12] 董聪, Chen YF, zhang yj, 刘玉岭, 卢志刚, Dong P, 刘宝旭. BEDIM : Lateral Movement Detection In Enterprise Network Through Behavior Deviation Measurement. HPCC. 2022, 第 5 作者[13] 樊昭杉, 王青, 刘俊荣, 崔泽林, 刘玉岭, 刘松. 域名滥用行为检测技术研究综述. 计算机研究与发展[J]. 2022, [14] Chuyi Yan, Chen Zhang, Zhigang Lu, Zehui Wang, Yuling Liu, Baoxu Liu. Blockchain abnormal behavior awareness methods: a survey. 网络空间安全科学与技术(英文). 2022, 第 3 作者5(2): 92-118, http://lib.cqvip.com/Qikan/Article/Detail?id=7107732567.[15] Xueying Han, Song Liu, Pu Dong, Bo Jiang, Zhigang Lu, Zelin Cui. IV-IDM: Reliable Intrusion Detection Method based on Involution and Voting. IEEE International Conference on Communications (ICC 2021). 2022, 第 5 作者[16] Haitao Xiao, Yuling Liu, Dan Du, Zhigang Lu. An Approach for Predicting the Costs of Forwarding Contracts using Gradient Boosting. 2022 17th Conference on Computer Science and Intelligence Systems (FedCSIS). 2022, 第 4 作者https://ieeexplore.ieee.org/abstract/document/9908920/authors#authors.[17] Dong, Cong, Lu, Zhigang, Cui, Zelin, Liu, Baoxu, Chen, Kai. MBTree: Detecting Encryption RAT Communication Using Malicious Behavior Tree. 2021, 第 2 作者http://arxiv.org/abs/2006.10196.[18] Dong, Cong, Lu, Zhigang, Cui, Zelin, Liu, Baoxu, Chen, Kai. MBTree: Detecting Encryption RATs Communication Using Malicious Behavior Tree. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2021, 第 2 作者 通讯作者 16: 3589-3603, http://dx.doi.org/10.1109/TIFS.2021.3071595.[19] 汤霁月, 杨乐, 刘松, 刘文懋, 王萌, 王冲华, 姜波, 卢志刚. Caps-LSTM: A Novel Hierarchical Encrypted VPN Network Traffic Identification Using CapsNet and LSTM. Third International Conference on Science of Cyber Security. 2021, 第 8 作者https://link.springer.com/chapter/10.1007/978-3-030-89137-4_10.[20] Ma, Pingchuan, Jiang, Bo, Lu, Zhigang, Li, Ning, Jiang, Zhengwei. Cybersecurity Named Entity Recognition Using Bidirectional Long Short-Term Memory with Conditional Random Fields. TSINGHUA SCIENCE AND TECHNOLOGY[J]. 2021, 第 3 作者26(3): 259-265, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=7098059&detailType=1.[21] 凌玥, 刘玉岭, 姜波, 李宁, 卢志刚, 刘宝旭. 基于双层异质集成学习器的入侵检测方法. 信息安全学报[J]. 2021, 第 5 作者 通讯作者 6(3): 16-28, [22] 蹇诗婕, 卢志刚, 姜波, 刘玉岭, 刘宝旭. 基于层次聚类方法的流量异常检测. 信息安全研究[J]. 2020, 第 2 作者6(6): 474-481, http://lib.cqvip.com/Qikan/Article/Detail?id=7101844396.[23] 蹇诗婕, 卢志刚, 杜丹, 姜波, 刘宝旭. 网络入侵检测技术综述. 信息安全学报[J]. 2020, 第 2 作者5(4): 96-122, http://lib.cqvip.com/Qikan/Article/Detail?id=7102488257.[24] Lu Zhigang. STIDM: A Spatial and Temporal Aware Intrusion Detection Model. Trustcom. 2020, 第 1 作者[25] Valeria V Krzhizhanovskaya, Gbor Zvodszky, Michael H Lees, Jack J Dongarra, Peter M A Sloot, Srgio Brissos, Joo Teixeira, Bo Jiang, Zhigang Lu, Yuling Liu, Ning Li, Zelin Cui. Social Recommendation in Heterogeneous Evolving Relation Network. COMPUTATIONAL SCIENCE – ICCS 2020. 2020, 第 9 作者12137: 554-567, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7302249/.[26] Chen, Liangchen, Gao, Shu, Liu, Baoxu, Lu, Zhigang, Jiang, Zhengwei. THS-IDPC: A three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection. JOURNAL OF SUPERCOMPUTING[J]. 2020, 第 4 作者76(9): 7489-7518, https://www.webofscience.com/wos/woscc/full-record/WOS:000544146500002.[27] Dong, Cong, Zhang, Chen, Lu, Zhigang, Liu, Baoxu, Jiang, Bo. CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification. COMPUTERNETWORKS[J]. 2020, 第 3 作者176: http://dx.doi.org/10.1016/j.comnet.2020.107258.[28] Valeria V Krzhizhanovskaya, Gbor Zvodszky, Michael H Lees, Jack J Dongarra, Peter M A Sloot, Srgio Brissos, Joo Teixeira, Qing Wang, Linyu Li, Bo Jiang, Zhigang Lu, Junrong Liu, Shijie Jian. Malicious Domain Detection Based on K-means and SMOTE. COMPUTATIONAL SCIENCE – ICCS 2020. 2020, 第 11 作者12138: 468-481, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7302825/.[29] 韩瑶鹏, 卢志刚, 姜波, 刘玉岭, 张辰, 姜政伟, 李宁. MTLAT A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER. 15th Annual IFIP International Conference on Network and Parallel Computing(NPC 2018). 2020, 第 2 作者https://link.springer.com/chapter/10.1007/978-3-030-79478-1_4.[30] 卢志刚. 基于聚类过采样和自动编码器的网络入侵检测方法. 信息安全学报. 2020, 第 1 作者[31] Chen, Liangchen, Gao, Shu, Liu, Baoxu, Lu, Zhigang, Jiang, Zhengwei. FEW-NNN: A Fuzzy Entropy Weighted Natural Nearest Neighbor Method for Flow-Based Network Traffic Attack Detection. CHINA COMMUNICATIONS[J]. 2020, 第 4 作者17(5): 151-167, http://lib.cqvip.com/Qikan/Article/Detail?id=7101861525.[32] 董聪, 姜波, 卢志刚, 刘宝旭, 李宁, 马平川, 姜政伟, 刘俊荣. 面向网络空间安全情报的知识图谱综述. 信息安全学报[J]. 2020, 第 3 作者5(5): 56-76, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20200505&flag=1.[33] IEEE International Conference on Bioinformatics and Biomedicine. 2020, 第 6 作者[34] Wang, Tian, Zhang, Chen, Lu, Zhigang, Du, Dan, Han, Yaopeng, Baru, C, Huan, J, Khan, L, Hu, XH, Ak, R, Tian, Y, Barga, R, Zaniolo, C, Lee, K, Ye, YF. Identifying Truly Suspicious Events and False Alarms Based on Alert Graph. 2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA). 2019, 第 3 作者5929-5936, [35] 陈良臣, 高曙, 刘宝旭, 卢志刚. 网络加密流量识别研究进展及发展趋势. 信息网络安全[J]. 2019, 第 4 作者19-25, http://lib.cqvip.com/Qikan/Article/Detail?id=7001384021.[36] Jiang Bo, Lu Zhigang, Li Ning, Wu Jianjun, Yi Feng, Han Dongxu, Li G, Yang J, Gama J, Natwichai J, Tong Y. Retweeting Prediction Using Matrix Factorization with Binomial Distribution and Contextual Information. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2019), PT II. 2019, 第 2 作者11447: 121-138, [37] Lu Zhigang. When Graph Kernel Meets Deep Neural Network: A Case Study for Network Attack Detection. TrustCom. 2019, 第 1 作者[38] Jiang, Bo, Lu, Zhigang, Li, Ning, Cui, Zelin, Rodrigues, JMF, Cardoso, PJS, Monteiro, J, Lam, R, Krzhizhanovskaya, VV, Lees, MH, Dongarra, JJ, Sloot, PMA. Mention Recommendation with Context-Aware Probabilistic Matrix Factorization. COMPUTATIONAL SCIENCE - ICCS 2019, PT II. 2019, 第 2 作者 通讯作者 11537: 247-261, [39] 都鸣, 江钧, 姜政伟, 卢志刚, 杜翔宇. PRTIRG: A Knowledge Graphfor People-Readable Threat Intelligence Recommendation. The 10th International Conference on Knowledge Science, Engineering and Management. 2019, 第 4 作者https://link.springer.com/chapter/10.1007%2F978-3-030-29551-6_5.[40] Yepeng Yao, Liya Su, Zhigang Lu, Baoxu Liu. STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection. 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom) / 13th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE). 2019, 第 3 作者 通讯作者 120-127, [41] Yepeng Yao, Liya Su, Chen Zhang, Zhigang Lu, Baoxu Liu. Marrying Graph Kernel with Deep Neural Network: A Case Study for Network Anomaly Detection. 19th Annual International Conference on Computational Science (ICCS). 2019, 第 4 作者 通讯作者 11537: 102-115, [42] Liya Su, Yepeng Yao, Zhigang Lu, Baoxu Liu. Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-based Network Attack Detection. 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom) / 13th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE). 2019, 第 3 作者312-318, [43] Cai, Zhenzhen, Jiang, Bo, Lu, Zhigang, Liu, Junrong, Ma, Pingchuan, IEEE. isAnon: Flow-Based Anonymity Network Traffic Identification Using Extreme Gradient Boosting. 2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN). 2019, 第 3 作者[44] Liya Su, Yepeng Yao, Ning Li, Junrong Liu, Zhigang Lu, Baoxu Liu. Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom) / 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE). 2018, 第 5 作者744-753, [45] Jiang, Bo, Lu, Zhigang, Li, Ning, Wu, Jianjun, Jiang, Zhengwei, Shi, Y, Fu, H, Tian, Y, Krzhizhanovskaya, VV, Lees, MH, Dongarra, J, Sloot, PMA. Retweet Prediction Using Social-Aware Probabilistic Matrix Factorization. COMPUTATIONAL SCIENCE - ICCS 2018, PT I. 2018, 第 2 作者 通讯作者 10860: 316-327, [46] Lu Zhigang. DeepGFL: Deep Feature Learning via Graph for Attack Detection on Flow-based Networraffic. Milcom. 2018, 第 1 作者 通讯作者 [47] 汪鑫, 武杨, 卢志刚. 基于威胁情报平台的恶意URL检测研究. 计算机科学[J]. 2018, 第 3 作者45(3): 124-130,170, http://lib.cqvip.com/Qikan/Article/Detail?id=674721791.[48] Mingyi Chen, Yepeng Yao, Junrong Liu, Bo Jiang, Liya Su, Zhigang Lu. A Novel Approach for Identifying Lateral Movement Attacks Based on Network Embedding. 16th IEEE ISPA / 17th IEEE IUCC / 8th IEEE BDCloud / 11th IEEE SocialCom / 8th IEEE SustainCom. 2018, 第 6 作者708-715, [49] 汪鑫, 卢志刚, 姜政伟, 李强. An Approach to Verifying Threat Intelligence Based on Graph Propagation. 2018 IEEE Symposium on Security and Privacy (SP). 2018, 第 2 作者https://www.ieee-security.org/TC/SP2018/poster-abstracts/oakland2018-paper9-poster-abstract.pdf.[50] Yepeng Yao, Liya Su, Zhigang Lu. DeepGFL: Deep Feature Learning via Graph for Attack Detection on Flow-based Network Traffic. IEEE Military Communications Conference (MILCOM). 2018, 第 3 作者 通讯作者 579-584, [51] Yang Bo, Li Ning, Lu Zhigang, Jiang Jianguo, Shi Z, Vadera S, Li G. Event Detection with Convolutional Neural Networks for Forensic Investigation. INTELLIGENT INFORMATION PROCESSING VIII. 2016, 第 3 作者486: 97-107, [52] Cong Dong, Jiahai Yang, Song Liu, Zhi Wang, Yuling Liu, Zhigang Lu. C-BEDIM and S-BEDIM: Lateral Movement Detection In Enterprise Network Through Behavior Deviation Measurement. COMPUTERS & SECURITY. 第 6 作者http://dx.doi.org/10.1016/j.cose.2023.103267.