发表论文
(1) Detecting compromised email accounts via login behavior characterization, Detecting compromised email accounts via login behavior characterization, CYBERSECURITY, 2024, 第 5 作者(2) Unveiling shadows: A comprehensive framework for insider threat detection based on statistical and sequential analysis, COMPUTERS & SECURITY, 2024, 第 6 作者(3) Unveiling encrypted traffic types through hierarchical network characteristics, COMPUTERS & SECURITY, 2024, 第 6 作者(4) ProcSAGE: an efficient host threat detection method based on graph representation learning, CYBERSECURITY, 2024, 第 7 作者(5) 一种基于模板的RSA-CRT模约减攻击方法, An Attack Method Against the Modular Reduction Within a RSA-CRT Implementation Based on Template Attack, 电子学报, 2024, 第 6 作者(6) 工业互联网流量分析技术综述, 通信学报, 2024, 第 8 作者(7) 基于聚类过采样和自动编码器的网络入侵检测方法, 信息安全学报, 2023, 第 5 作者(8) Aparecium: understanding and detecting scam behaviors on Ethereum via biased random walk, CYBERSECURITY, 2023, 第 8 作者(9) PUMD:a PU learning-based malicious domain detection framework, PUMD:a PU learning-based malicious domain detection framework, 网络空间安全科学与技术(英文), 2023, 第 7 作者(10) HANDOM: Heterogeneous Attention Network Model for Malicious Domain Detection, COMPUTERS & SECURITY, 2023, 第 10 作者 通讯作者(11) Detecting compromised email accounts via login behavior characterization, CYBERSECURITY, 2023, 第 5 作者(12) C-BEDIM and S-BEDIM: Lateral movement detection in enterprise network through behavior deviation measurement, COMPUTERS & SECURITY, 2023, 第 5 作者(13) CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network, Security and Privacy in Communication Networks: 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings, 2023, 第 7 作者 通讯作者(14) CBSeq: A Channel-Level Behavior Sequence for Encrypted Malware Traffic Detection, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 第 4 作者(15) Differential Fault Analysis on 3DES Middle Rounds Based on Error Propagation, Differential Fault Analysis on 3DES Middle Rounds Based on Error Propagation, CHINESE JOURNAL OF ELECTRONICS, 2022, 第 7 作者(16) DCC-Find: DNS Covert Channel Detection by Features Concatenation-Based LSTM, 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2022, 第 8 作者 通讯作者(17) An Approach for Predicting the Costs of Forwarding Contracts using Gradient Boosting, 2022 17th Conference on Computer Science and Intelligence Systems (FedCSIS), 2022, 第 2 作者 通讯作者(18) Blockchain abnormal behavior awareness methods: a survey, CYBERSECURITY, 2022, 第 5 作者(19) DGGCN: Dictionary based DGA detection method based on DomainGraph and GCN, 2022 International Conference on Computer Communications and Networks (ICCCN), 2022, 第 7 作者 通讯作者(20) BEDIM : Lateral Movement Detection In Enterprise Network Through Behavior Deviation Measurement, HPCC, 2022, 第 4 作者(21) 域名滥用行为检测技术综述, Survey on Domain Name Abuse Detection Technology, 计算机研究与发展, 2022, 第 5 作者(22) Blockchain abnormal behavior awareness methods: a survey, Blockchain abnormal behavior awareness methods: a survey, 网络空间安全科学与技术(英文), 2022, 第 5 作者(23) Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack, Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack, DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 第 3 作者(24) PUMD: a PU learning-based malicious domain detection framework, CYBERSECURITY, 2022, 第 7 作者(25) 基于深度确定性策略梯度的随机路由防御方法, Random routing defense method based on deep deterministic policy gradient, 通信学报, 2021, 第 4 作者(26) An Adaptive IP Hopping Approach for Moving Target Defense Using a Light-Weight CNN Detector, SECURITY AND COMMUNICATION NETWORKS, 2021, 第 3 作者(27) Wp-gbdt: An approach for winner prediction using gradient boosting decision tree, 2021 IEEE International Conference on Big Data (Big Data), 2021, 第 2 作者 通讯作者(28) 网络安全态势感知标准架构设计, Design of the Standard Architecture of the Network Security Situation Awareness, 信息安全研究, 2021, 第 3 作者(29) 基于双层异质集成学习器的入侵检测方法, 信息安全学报, 2021, 第 2 作者(30) STIDM: A Spatial and Temporal Aware Intrusion Detection Model, Trustcom, 2020, (31) Optimal Decision Making Approach for Cyber Security Defense Using Evolutionary Game, IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 第 2 作者 通讯作者(32) Social Recommendation in Heterogeneous Evolving Relation Network, COMPUTATIONAL SCIENCE – ICCS 2020, 2020, 第 10 作者(33) 基于区块链的网络安全威胁情报共享模型, Cyber Security Threat Intelligence Sharing Model Based on Blockchain, 计算机研究与发展, 2020, 第 5 作者(34) Attack scenario reconstruction approach using attack graph and alert data mining, JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 第 4 作者(35) MTLAT A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER, 15th Annual IFIP International Conference on Network and Parallel Computing(NPC 2018), 2020, 第 4 作者(36) An Automatic Approach for Scoring Vulnerabilities in Risk Assessment, PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL AND ELECTRONIC ENGINEERING (EEE 2019), 2019, 第 4 作者(37) 电力调度自动化软件安全态势评估方法, Power Dispatch Software Security Situation Assessment Method, 信息网络安全, 2019, 第 1 作者(38) Improved schemes for visual secret sharing based on random grids, MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 第 3 作者(39) 基于攻击图的网络安全度量研究综述, Survey of attack graph based network security metric, 网络与信息安全学报, 2018, 第 2 作者(40) Application of Dynamic Security Technology Architecture for Advanced Directional Attacks in Power System Information Security, 2018 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON), 2018, 第 5 作者(41) Optimal Network Defense Strategy Selection Based on Incomplete Information Evolutionary Game, IEEE ACCESS, 2018, 第 2 作者 通讯作者(42) 基于吸收Markov链的网络入侵路径预测方法, Route Prediction Method for Network Intrusion Using Absorbing Markov Chain, 计算机研究与发展, 2018, 第 2 作者(43) 面向漏洞生命周期的安全风险度量方法, Vulnerability Life Cycle Oriented Security Risk Metric Method, 软件学报, 2018, 第 5 作者(44) New Insights into Approaches to Evaluating Intention and Path for Network Multistep Attacks, MATHEMATICAL PROBLEMS IN ENGINEERING, 2018, 第 2 作者 通讯作者(45) Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis, SECURITY AND COMMUNICATION NETWORKS, 2018, 第 2 作者 通讯作者(46) 网络安全态势感知技术研究综述, 第六届全国网络安全等级保护技术大会, 2017, 第 1 作者(47) 基于攻击预测的网络安全态势量化方法, Quantitative method for network security situation based on attack prediction, 通信学报, 2017, 第 5 作者(48) Quantitative Method for Network Security Situation Based on Attack Prediction, SECURITY AND COMMUNICATION NETWORKS, 2017, 第 3 作者(49) 基于能力机会意图模型的网络安全态势感知方法, Network security situational awareness method based on capability-opportunity-intent model, 计算机应用研究, 2016, 第 2 作者(50) A Lattice-based Access Control Model for Social Networks, 2016 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY PROCEEDINGS - CYBERC 2016, 2016, 第 3 作者(51) 基于灰色理论的云环境安全态势感知方法, 第四届信息安全等级保护技术大会, 2015, 第 1 作者(52) 一种基于多属性决策的DDoS防护措施遴选方法, Method of DDoS Countermeasure Selection Based on Multi-Attribute Decision Making, 软件学报, 2015, 第 6 作者(53) A Game Theory Based Approach to the Generation of Optimal DDoS Defending Strategy, ComSec, 2014, (54) 一种基于UML的网络安全体系建模分析方法, UML-Based Modeling Method of Network Security Infrastructure, 计算机研究与发展, 2014, 第 2 作者(55) 基于时空维度分析的网络安全态势预测方法, Network Situation Prediction Method Based on Spatial-Time Dimension Analysis, 计算机研究与发展, 2014, 第 1 作者(56) Optimal defense strategies for DDoS defender using Bayesian game model, 9th International Conference on Information Security Practice and Experience, ISPEC 2013, 2013, 第 1 作者(57) 基于静态贝叶斯博弈的蠕虫攻防策略绩效评估, 软件学报, 2012, (58) 一种基于攻击图的安全威胁识别和分析方法, A Security Threats Identification and Analysis Method Based on Attack Graph, 计算机学报, 2012, 第 4 作者(59) CYBERSECURITY, 第 6 作者(60) CYBERSECURITY, 第 7 作者