发表论文
[1] 蒋明昊, 崔明鑫, 侯承尚, 蔡玮, 李镇, 熊刚, 苟高鹏. FA-Net: More Accurate Encrypted Network Traffic Classification Based on Burst with Self-Attention. 2023 International Joint Conference on Neural Networks (IJCNN). 2023, 第 6 作者https://ieeexplore.ieee.org/abstract/document/10191615.[2] Jiang, Minghao, Cui, Mingxin, Liu, Chang, Gou, Gaopeng, Xiong, Gang, Li, Zhen. Zero-relabelling mobile-app identification over drifted encrypted network traffic. COMPUTER NETWORKS[J]. 2023, 第 5 作者228: http://dx.doi.org/10.1016/j.comnet.2023.109728.[3] Guan, Zhong, Liu, Chang, Xiong, Gang, Li, Zhen, Gou, Gaopeng. FlowTracker: Improved flow correlation attacks with denoising and contrastive learning. COMPUTERS & SECURITY[J]. 2023, 第 3 作者125: http://dx.doi.org/10.1016/j.cose.2022.103018.[4] 李韵锋, 苟高鹏, 熊刚, 李镇, 崔明鑫. The Potential Utility of Image Descriptions: User Identity Linkage across Social Networks Based on MultiModal Self-Attention Fusion. 2023 IEEE International Performance, Computing, and Communications Conference (IPCCC). 2023, 第 3 作者https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10253842.[5] Yuan, Qingjun, Liu, Chang, Yu, Wentao, Zhu, Yuefei, Xiong, Gang, Wang, Yongjuan, Gou, Gaopeng. BoAu: Malicious traffic detection with noise labels based on boundary augmentation. COMPUTERS & SECURITY[J]. 2023, 第 5 作者131: http://dx.doi.org/10.1016/j.cose.2023.103300.[6] Yuan, Qingjun, Zhu, Yuefei, Xiong, Gang, Wang, Yongjuan, Yu, Wentao, Lu, Bin, Gou, Gaopeng. ULDC: Unsupervised Learning-Based Data Cleaning for Malicious Traffic With High Noise. COMPUTER JOURNAL. 2023, 第 3 作者http://dx.doi.org/10.1093/comjnl/bxad036.[7] 谢一博, 苟高鹏, 熊刚, 李镇, 崔明鑫. Covertness Analysis of Snowflake Proxy Request. 2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD). 2023, 第 3 作者https://ieeexplore.ieee.org/abstract/document/10152736.[8] 谢一博, 苟高鹏, 熊刚, 李镇, 崔明鑫. Analysing Covertness of Tor Bridge Request. ICC 2023-IEEE International Conference on Communications. 2023, 第 3 作者https://ieeexplore.ieee.org/abstract/document/10152736.[9] 朱智燊, 石俊峥, 王冲华, 熊刚, 郝志强, 苟高鹏. MCFM:Discover Sensitive Behavior from Encrypted Traffic in Industrial Control System. IEEE International Conference on Trust, Security and Privacy in Computing and Communications. 2022, 第 4 作者[10] 王炳旭, 李镇, 苟高鹏, 扶佩佩, 熊刚, 秦颖超. A Two-stage Method for Fine-grained DNS Covert Tunnel Behavior Detection. International Conference on Science of Cyber Security. 2022, 第 5 作者[11] Li, Sijia, Gou, Gaopeng, Liu, Chang, Hou, Chengshang, Li, Zhenzhen, Xiong, Gang. TTAGN: Temporal Transaction Aggregation Graph Network for Ethereum Phishing Scams Detection. 2022, 第 6 作者[12] 赵晨, 丁嘉宁, 李真真, 李镇, 熊刚, 苟高鹏. Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics. Australasian Conference on Information Security and Privacy. 2022, 第 5 作者[13] Lin, Xinjie, Liu, Han, Li, Zhen, Xiong, Gang, Gou, Gaopeng. Privacy protection of China's top websites: A Multi-layer privacy measurement via network behaviours and privacy policies. COMPUTERS & SECURITY[J]. 2022, 第 4 作者114: http://dx.doi.org/10.1016/j.cose.2022.102606.[14] 崔天宇, 熊刚, 刘畅, 石俊峥, 扶佩佩, 苟高鹏. GALG:Linking Addresses in Tracking Ecosystem Using Graph Autoencoder with Link Generation. The European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases. 2022, 第 2 作者[15] 林鑫杰, 熊刚, 苟高鹏, 石俊峥, 于静. ET-BERT: A Contextualized Datagram Representation with Pre-training Transformers for Encrypted Traffic Classification. WWW[J]. 2022, 第 2 作者[16] 管中, 刘畅, 熊刚, 李镇, 苟高鹏. FlowTracker: Improved flow correlation attacks with denoising and contrastive learning. Computers & Security[J]. 2022, 第 3 作者[17] Jiang, Minghao, Li, Zhen, Fu, Peipei, Cai, Wei, Cui, Mingxin, Xiong, Gang, Gou, Gaopeng. Accurate mobile-app fingerprinting using flow-level relationship with graph neural networks. COMPUTER NETWORKS[J]. 2022, 第 6 作者217: http://dx.doi.org/10.1016/j.comnet.2022.109309.[18] 赵盼盼, 苟高鹏, 刘畅, 管洋洋, 崔明鑫, 熊刚. TMT-RF: Tunnel Mixed Traffic Classification Based on Random Forest. SecureComm. 2021, 第 6 作者 通讯作者 https://link.springer.com/chapter/10.1007/978-3-030-90019-9_21.[19] 管中, 熊刚, 苟高鹏, 李镇, 崔明鑫, 刘畅. BAPM:Block Attention Profiling Model for Multi tab Website Fingerprinting Attacks on Tor. Proceedings of the 37th Annual Computer Security Applications Conference. 2021, 第 2 作者https://dl.acm.org/doi/abs/10.1145/3485832.3485891.[20] 夏葳, 崔明鑫, 王伟, 管洋洋, 李真真, 李镇, 熊刚. Illuminate the Shadow: A Comprehensive Study of TLS Client Certificate Ecosystem in the Wild. 2021 28th International Conference on Telecommunications (ICT). 2021, 第 7 作者https://ieeexplore.ieee.org/abstract/document/9511513.[21] Zhao, Zhendong, Chen, Xiaojun, Wang, Dakui, Xuan, Yuexin, Xiong, Gang. Robust node embedding against graph structural perturbations. INFORMATION SCIENCES[J]. 2021, 第 5 作者566: 165-177, http://dx.doi.org/10.1016/j.ins.2021.02.046.[22] Liu, Chang, Xiong, Gang, Gou, Gaopeng, Yiu, SiuMing, Li, Zhen, Tian, Zhihong. Classifying encrypted traffic using adaptive fingerprints with multi-level attributes. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS[J]. 2021, 第 2 作者24(6): 2071-2097, http://dx.doi.org/10.1007/s11280-021-00940-0.[23] Wang, Yu, Gou, Gaopeng, Liu, Chang, Cui, Mingxin, Li, Zhen, Xiong, Gang. Survey of security supervision on blockchain from the perspective of technology. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS[J]. 2021, 第 6 作者 通讯作者 60: http://dx.doi.org/10.1016/j.jisa.2021.102859.[24] Tian, Jing, Gou, Gaopeng, Liu, Chang, Chen, Yige, Xiong, Gang, Li, Zhen, Zhou, J, Luo, X, Shen, Q, Xu, Z. DLchain: A Covert Channel over Blockchain Based on Dynamic Labels. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019). 2020, 第 5 作者11999: 814-830, [25] Shi, Junzheng, Yang, Qingya, Gou, Gaopeng, Xiong, Gang, Assoc Comp Machinery. An Quick Available-Bandwidth Measurement Method Based on Link Delay Growth Rate. ICCBN 2020: 2020 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND BROADBAND NETWORKING / ICCET 2020: 2020 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND TECHNOLOGY. 2020, 第 4 作者51-57, http://dx.doi.org/10.1145/3390525.3390531.[26] Hou, Chengshang, Gou, Gaopeng, Xiong, Gang, Li, Zhen, IEEE. Joint Analysis of Port and Protocol via Endpoint Measurement: An Empirical Study. APNOMS 2020: 2020 21ST ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS). 2020, 第 11 作者231-234, [27] Tian, Jing, Xiong, Gang, Li, Zhen, Gou, Gaopeng. A Survey of Key Technologies for Constructing Network Covert Channel. SECURITY AND COMMUNICATION NETWORKS. 2020, 第 2 作者2020: https://doaj.org/article/8cbed37edb634c449b929fef69bb9726.[28] Guo, Yu, Li, Zhenzhen, Li, Zhen, Xiong, Gang, Jiang, Minghao, Gou, Gaopeng, IEEE. FLAGB: Focal Loss based Adaptive Gradient Boosting for Imbalanced Traffic Classification. 2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN). 2020, 第 4 作者[29] Fan, Xinlei, Gou, Gaopeng, Kang, Cuicui, Shi, Junzheng, Xiong, Gang, IEEE. Identify OS from encrypted traffic with TCP/IP stack fingerprinting. 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC). 2019, 第 5 作者[30] Jiang, Minghao, Gou, Gaopeng, Shi, Junzheng, Xiong, Gang, IEEE. I Know What You Are Doing With Remote Desktop. 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC). 2019, 第 4 作者[31] He, Wenxuan, Gou, Gaopeng, Kang, Cuicui, Liu, Chang, Li, Zhen, Xiong, Gang, IEEE. Malicious Domain Detection via Domain Relationship and Graph Models. 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC). 2019, 第 6 作者[32] Wang Hai, Wang Yong, Cao Zigang, Li Zhen, Xiong Gang, Yun X, Wen W, Lang B, Yan H, Ding L, Li J, Zhou Y. An Overview of Blockchain Security Analysis. CYBER SECURITY, CNCERT 2018. 2019, 第 11 作者970: 55-72, [33] Liu Chang, He Longtao, Xiong Gang, Cao Zigang, Li Zhen, IEEE. FS-Net: A How Sequence Network For Encrypted Traffic Classification. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019). 2019, 第 3 作者1171-1179, [34] Zhang, Ziqing, Karig, Cuicui, Xiong, Gang, Li, Zhen, ACM. Deep Forest with LRRS Feature for Fine-grained Website Fingerprinting with Encrypted SSL/TLS. PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM '19). 2019, 第 3 作者851-860, http://dx.doi.org/10.1145/3357384.3357993.[35] Cui, Tianyu, Liu, Chang, Gou, Gaopeng, Shi, Junzheng, Xiong, Gang, IEEE. A Comprehensive Study of Accelerating IPv6 Deployment. 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC). 2019, 第 5 作者[36] Wang, Jibao, Cao, Zigang, Kang, Cuicui, Xiong, Gang, IEEE. User Behavior Classification in Encrypted Cloud Camera Traffic. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM). 2019, 第 4 作者[37] Yang Ying, Kang Cuicui, Gou Gaopeng, Li Zhen, Xiong Gang, IEEE. TLS/SSL Encrypted Traffic Classification with Autoencoder and Convolutional Neural Network. IEEE 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS / IEEE 16TH INTERNATIONAL CONFERENCE ON SMART CITY / IEEE 4TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS). 2018, 第 5 作者362-369, http://dx.doi.org/10.1109/HPCC/SmartCity/DSS.2018.00079.[38] Liu, Chang, Cao, Zigang, Li, Zhen, Xiong, Gang, IEEE. LaFFT: Length-Aware FFT Based Fingerprinting for Encrypted Network Traffic Classification. 2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC). 2018, 第 4 作者20-25, [39] Gou, Gaopeng, Shi, Junzheng, Xiong, Gang, Fu, Peipei, Li, Zhen, Li, Zhenzhen, Jiang, S, Zeng, B, Huang, Q, ElSaddik, A, Li, H, Fan, X. Image-Set Based Collaborative Representation for Face Recognition in Videos. ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2017, PT II. 2018, 第 3 作者10736: 498-507, [40] Hou Chengshang, Shi Junzheng, Kang Cuicui, Cao Zigang, Gang Xiong, IEEE. Classifying User Activities in the Encrypted WeChat Traffic. 2018 IEEE 37TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC). 2018, 第 5 作者[41] Li, Longxi, Gou, Gaopeng, Xiong, Gang, Cao, Zigang, Li, Zhen, Jiang, S, Zeng, B, Huang, Q, ElSaddik, A, Li, H, Fan, X. Identifying Gambling and Porn Websites with Image Recognition. ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2017, PT II. 2018, 第 3 作者10736: 488-497, [42] Cui, Mingxin, Cao, Zigang, Xiong, Gang, Shi, Y, Fu, H, Tian, Y, Krzhizhanovskaya, VV, Lees, MH, Dongarra, J, Sloot, PMA. How Is the Forged Certificates in the Wild: Practice on Large-Scale SSL Usage Measurement and Analysis. COMPUTATIONAL SCIENCE - ICCS 2018, PT III. 2018, 第 11 作者10862: 654-667, [43] Zeng, Xudong, Kang, Cuicui, Shi, Junzheng, Li, Zhen, Xiong, Gang, Shi, Y, Fu, H, Tian, Y, Krzhizhanovskaya, VV, Lees, MH, Dongarra, J, Sloot, PMA. Old Habits Die Hard: Fingerprinting Websites on the Cloud. COMPUTATIONAL SCIENCE - ICCS 2018, PT III. 2018, 第 5 作者10862: 499-511, [44] Liu, Chang, Cao, Zigang, Xiong, Gang, Gou, Gaopeng, Yiu, SiuMing, He, Longtao, IEEE. MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints. 2018 IEEE/ACM 26TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS). 2018, 第 3 作者http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000461354300006.[45] Liu, Chang, Zeng, Lingwu, Shi, Junzheng, Xu, Fei, Xiong, Gang, Yiu, S M, IEEE. Auto-identification of Background Traffic Based on Autonomous Periodic Interaction. 2017 IEEE 36TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC). 2017, 第 5 作者[46] Gou Gaopeng, Li Zhen, Xiong Gang, Guan Yangyang, Shi Junzheng, Koumoutsakos P, Lees M, Krzhizhanovskaya V, Dongarra J, Sloot P. Video face recognition through multi-scale and optimization of margin distributions. INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE (ICCS 2017). 2017, 第 3 作者108: 2458-2462, http://dx.doi.org/10.1016/j.procs.2017.05.058.[47] Gou, Gaopeng, Bai, Quan, Xiong, Gang, Li, Zhenzhen. Discovering abnormal behaviors via HTTP header fields measurement. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE[J]. 2017, 第 3 作者29(20): https://www.webofscience.com/wos/woscc/full-record/WOS:000411486900008.[48] Li, Zhen, Pan, Haiqing, Liu, Wenhao, Xu, Fei, Cao, Zigang, Xiong, Gang. A network attack forensic platform against HTTP evasive behavior. JOURNAL OF SUPERCOMPUTING[J]. 2017, 第 6 作者 通讯作者 73(7): 3053-3064, https://www.webofscience.com/wos/woscc/full-record/WOS:000405297000014.[49] Cui Mingxin, Cao Zigang, Xiong Gang, Shi Junzheng, ACM. POSTER: A Comprehensive Study of Forged Certificates in the Wild. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY. 2017, 第 11 作者2487-2489, http://dx.doi.org/10.1145/3133956.3138851.[50] 丁嘉宁, 张鹏, 杨嵘, 刘俊朋, 刘庆云, 熊刚. 支持多租户的网络测试床模拟流量标记和溯源模型. 电子学报[J]. 2017, 第 6 作者45(8): 1947-1956, http://lib.cqvip.com/Qikan/Article/Detail?id=673054443.[51] Xu, Fei, Pan, Haiqing, Cao, Zigang, Li, Zhen, Xiong, Gang, Guan, Yangyang, Yiu, S M, IEEE. Identifying Malware with HTTP Content Type Inconsistency via Header-Payload Comparison. 2017 IEEE 36TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC). 2017, 第 5 作者[52] Zhang Ziqing, Kang Cuicui, Fu Peipei, Cao Zigang, Li Zhen, Xiong Gang, IEEE. Metric Learning With Statistical Features For Network Traffic Classification. 2017 IEEE 36TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC). 2017, 第 6 作者[53] Cai Zixi, Cao Zigang, Xiong Gang, Li Zhen, Xia Wei, ACM. POSTER: An Empirical Measurement Study on Multi-tenant Deployment Issues of CDNs. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY. 2017, 第 3 作者2471-2473, http://dx.doi.org/10.1145/3133956.3138852.[54] Li Qian, Niu Wenjia, Li Gang, Tan Jianlong, Xiong Gang, Guo Li, IEEE. Riemannian Optimization with Subspace Tracking for Low-rank Recovery. 2016 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN). 2016, 第 5 作者3280-3287, [55] 赵宇飞, 熊刚, 贺龙涛, 李舟军. 面向网络环境的SQL注入行为检测方法. 通信学报[J]. 2016, 第 2 作者37(2): 2016034-1, http://lib.cqvip.com/Qikan/Article/Detail?id=668040330.[56] 喻思敏, 李镇, 熊刚. 一种基于数据层的BGP网络前缀分类研究. 信息网络安全[J]. 2015, 第 3 作者274-277, http://lib.cqvip.com/Qikan/Article/Detail?id=666205659.[57] 熊刚, 何慧敏, 于静, 刘燕兵, 郭莉. HybridFA:一种基于统计的AC自动机空间优化技术. 通信学报[J]. 2015, 第 1 作者36(7): 31-39, http://lib.cqvip.com/Qikan/Article/Detail?id=665529103.[58] Cao Zigang, Xiong Gang, Zhao Yong, Guo Li, Fang Binxing. Two-Phased Method for Detecting Evasive Network Attack Channels. CHINA COMMUNICATIONS[J]. 2014, 第 2 作者 通讯作者 11(8): 47-58, http://lib.cqvip.com/Qikan/Article/Detail?id=661930200.[59] Zhang Yu, Xiong Gang, Liu Yanbing, Liu Mengya, Liu Ping, Guo Li, Chen L, Jia Y, Sellis T, Liu G. Delta-K-2-tree for Compact Representation of Web Graphs. WEB TECHNOLOGIES AND APPLICATIONS, APWEB 2014. 2014, 第 11 作者8709: 270-281, [60] 曹自刚, 熊刚, 赵咏. 基于X.509证书测量的隐私泄露分析. 计算机学报[J]. 2014, 第 2 作者37(1): 151-164, http://lib.cqvip.com/Qikan/Article/Detail?id=48544440.[61] Cao Zigang, Xiong Gang, Zhao Yong, Li Zhenzhen, Guo Li, Batten L, Li G, Niu W, Warren M. A Survey on Encrypted Traffic Classification. APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2014. 2014, 第 11 作者490: 73-81, [62] Yu Hongliang, Zhao Yong, Xiong Gang, Guo Li, Li Zhen, Wang Yong, ACM. POSTER: Mining Elephant Applications in Unknown Traffic by Service Clustering. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY. 2014, 第 3 作者1532-1534, http://dx.doi.org/10.1145/2660267.2662391.[63] CAO Zigang, XIONG Gang, ZHAO Yong, GUO Li, FANG Binxing. Two-Phased Method for Detecting Evasive Network Attack Channels. 中国通信:英文版[J]. 2014, 第 2 作者47-58, http://lib.cqvip.com/Qikan/Article/Detail?id=661930200.[64] 张宇, 刘燕兵, 熊刚, 贾焰, 刘萍, 郭莉. 图数据表示与压缩技术综述. 软件学报[J]. 2014, 第 3 作者25(9): 1937-1952, http://lib.cqvip.com/Qikan/Article/Detail?id=662039669.[65] 熊刚, 赵咏, 曹自刚. 基于主机行为关联的加密P2P流量实时分类方法. 高技术通讯[J]. 2013, 第 1 作者23(10): 1008-1015, http://lib.cqvip.com/Qikan/Article/Detail?id=47614033.[66] Song, Ming, Xiong, Gang, Li, Zhenzhen, Peng, Junrui, Guo, Li, IEEE. A De-anonymize attack method based on traffic analysis. 2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM). 2013, 第 2 作者455-460, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000330569800085.[67] 熊刚. 基于流分析的加密网络服务分类. 2013, 第 1 作者[68] 王勇, 云晓春, 姚垚, 熊刚. DNSSEC域名解析的形式化描述及量化分析研究. 计算机研究与发展[J]. 2012, 第 4 作者55-63, http://lib.cqvip.com/Qikan/Article/Detail?id=1003429563.[69] Chen Yang, Gang Xiong, Qing Zhang, Junzheng Shi, Gaopeng Gou, Zhen Li, Chang Liu. Few-shot encrypted traffic classification via multi-task representation enhanced meta-learning. COMPUTER NETWORKS. 第 2 作者http://dx.doi.org/10.1016/j.comnet.2023.109731.