发表论文
(1) Exploring the Potential and Boundaries of KAN in Encrypted Traffic Classification, International Joint Conference on Neural Networks, 2025, 第 5 作者(2) ANASETC: Automatic Neural Architecture Search for Encrypted Traffic Classification, ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2025, 第 4 作者(3) MalSE: Malware Detection Based on Multi-Dimensional API Call Sensitivity Estimation, International Joint Conference on Neural Networks, 2025, 第 4 作者(4) HoleMal: A lightweight IoT malware detection framework based on efficient host-level traffic processing, Computers & Security, 2025, 第 4 作者(5) Respond to Change with Constancy: Instruction-tuning with LLM for Non-I.I.D. Network Traffic Classification, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 第 2 作者(6) Deep learning and pre-training technology for encrypted traffic classification: A comprehensive review, NEUROCOMPUTING, 2025, 第 5 作者 通讯作者(7) DomEye: Detecting network covert channel of domain fronting with throughput fluctuation, Computers & Security, 2024, 第 3 作者(8) Let gambling hide nowhere: Detecting illegal mobile gambling apps via heterogeneous graph-based encrypted traffic analysis, COMPUTER NETWORKS, 2024, 第 7 作者(9) CETP: A novel semi-supervised framework based on contrastive pre-training for imbalanced encrypted traffic classification, COMPUTERS & SECURITY, 2024, 第 8 作者 通讯作者(10) 序言:网络公害治理技术与应用, Preface:Technology and Application of Network Public Nuisance Management, 集成技术, 2024, 第 1 作者(11) Identifying malicious traffic under concept drift based on intraclass consistency enhanced variational autoencoder, Identifying malicious traffic under concept drift based on intraclass consistency enhanced variational autoencoder, SCIENCE CHINA-INFORMATION SCIENCES, 2024, 第 4 作者 通讯作者(12) Traffic spills the beans: A robust video identification attack against YouTube, COMPUTERS & SECURITY, 2024, 第 2 作者(13) RecoSelector: Cost-Sensitive Feature Selection for Network Intrusion Detection in Resource-Constrained Internet of Things, 2024 IEEE International Performance, Computing, and Communications Conference (IPCCC), 2024, 第 4 作者(14) Incremental encrypted traffic classification via contrastive prototype networks, COMPUTER NETWORKS, 2024, 第 5 作者(15) FA-Net: More Accurate Encrypted Network Traffic Classification Based on Burst with Self-Attention, 2023 International Joint Conference on Neural Networks (IJCNN), 2023, 第 6 作者(16) Zero-relabelling mobile-app identification over drifted encrypted network traffic, COMPUTER NETWORKS, 2023, 第 5 作者(17) FlowTracker: Improved flow correlation attacks with denoising and contrastive learning, COMPUTERS & SECURITY, 2023, 第 3 作者(18) The Potential Utility of Image Descriptions: User Identity Linkage across Social Networks Based on MultiModal Self-Attention Fusion, 2023 IEEE International Performance, Computing, and Communications Conference (IPCCC), 2023, 第 3 作者(19) FedMP: Robust and Communication-Efficient Federated Multi-Prototype Intrusion Detection Framework in IoT, 2023 IEEE 29th International Conference on Parallel and Distributed Systems (ICPADS), 2023, 第 5 作者(20) Multi-Feature Fusion Based Approach for Classifying Encrypted Mobile Application Traffic, CSCWD 2023, 2023, 第 6 作者(21) BoAu: Malicious traffic detection with noise labels based on boundary augmentation, COMPUTERS & SECURITY, 2023, 第 5 作者(22) ULDC: Unsupervised Learning-Based Data Cleaning for Malicious Traffic With High Noise, COMPUTER JOURNAL, 2023, 第 3 作者(23) MENDER: Multi-level Feature Fusion Discovery Framework for Exposed ICS Remote Management Devices in the Wild, 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2023, 第 5 作者(24) 基于黑盒测试框架的深度学习模型版权保护方法, Copyright protection for deep learning models utilizing a black-box testing framework, 网络安全与数据治理, 2023, 第 3 作者(25) Covertness Analysis of Snowflake Proxy Request, 2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD), 2023, 第 3 作者(26) Analysing Covertness of Tor Bridge Request, ICC 2023-IEEE International Conference on Communications, 2023, 第 3 作者(27) MCFM:Discover Sensitive Behavior from Encrypted Traffic in Industrial Control System, IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2022, 第 4 作者(28) A Two-stage Method for Fine-grained DNS Covert Tunnel Behavior Detection, International Conference on Science of Cyber Security, 2022, 第 5 作者(29) TTAGN: Temporal Transaction Aggregation Graph Network for Ethereum Phishing Scams Detection, 2022, 第 6 作者(30) Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics, Australasian Conference on Information Security and Privacy, 2022, 第 5 作者(31) Privacy protection of China's top websites: A Multi-layer privacy measurement via network behaviours and privacy policies, COMPUTERS & SECURITY, 2022, 第 4 作者(32) GALG:Linking Addresses in Tracking Ecosystem Using Graph Autoencoder with Link Generation, The European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases, 2022, 第 2 作者(33) ET-BERT: A Contextualized Datagram Representation with Pre-training Transformers for Encrypted Traffic Classification, WWW, 2022, 第 2 作者(34) FlowTracker: Improved flow correlation attacks with denoising and contrastive learning, Computers & Security, 2022, 第 3 作者(35) Accurate mobile-app fingerprinting using flow-level relationship with graph neural networks, COMPUTER NETWORKS, 2022, 第 6 作者(36) TMT-RF: Tunnel Mixed Traffic Classification Based on Random Forest, Security and Privacy in Communication Networks: 17th EAI International Conference, SecureComm 2021, 2021, 第 6 作者 通讯作者(37) BAPM:Block Attention Profiling Model for Multi tab Website Fingerprinting Attacks on Tor, Proceedings of the 37th Annual Computer Security Applications Conference, 2021, 第 2 作者(38) Illuminate the Shadow: A Comprehensive Study of TLS Client Certificate Ecosystem in the Wild, 2021 28th International Conference on Telecommunications (ICT), 2021, 第 7 作者(39) Towards Multi-source Extension: A Multi-classification Method Based on Sampled NetFlow Records, TrustCom 2021, 2021, 第 7 作者(40) Let Imbalance Have Nowhere to Hide: Class-Sensitive Feature Extraction for Imbalanced Traffic Classification, 2021 International Joint Conference on Neural Networks (IJCNN), 2021, 第 3 作者(41) A Study on Security Analysis of the Unlinkability in Tor, MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM), 2021, 第 5 作者(42) EthSniffer: A Global Passive Perspective on Ethereum, International Conference on Blockchain and Trustworthy Systems, 2021, 第 4 作者(43) Old Habits Die Hard: A Sober Look at TLS Client Certificates in the Real World, 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2021, 第 4 作者(44) Robust node embedding against graph structural perturbations, INFORMATION SCIENCES, 2021, 第 5 作者(45) Classifying encrypted traffic using adaptive fingerprints with multi-level attributes, WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2021, 第 2 作者(46) Survey of security supervision on blockchain from the perspective of technology, JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 第 6 作者 通讯作者(47) Mining the Characteristics of the Ethereum P2P Network, BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020, 第 6 作者(48) NSA-Net: A NetFlow Sequence Attention Network for Virtual Private Network Traffic Detection, WISE 2020, 2020, 第 6 作者(49) DLchain: A Covert Channel over Blockchain Based on Dynamic Labels, INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 第 5 作者(50) An Quick Available-Bandwidth Measurement Method Based on Link Delay Growth Rate, ICCBN 2020: 2020 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND BROADBAND NETWORKING / ICCET 2020: 2020 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND TECHNOLOGY, 2020, 第 4 作者(51) Joint Analysis of Port and Protocol via Endpoint Measurement: An Empirical Study, APNOMS 2020: 2020 21ST ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2020, 第 3 作者 通讯作者(52) A Survey of Key Technologies for Constructing Network Covert Channel, SECURITY AND COMMUNICATION NETWORKS, 2020, 第 2 作者(53) FLAGB: Focal Loss based Adaptive Gradient Boosting for Imbalanced Traffic Classification, 2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2020, 第 4 作者(54) WF-GAN: Fighting Back Against Website Fingerprinting Attack Using Adversarial Learning, 2020 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2020, 第 5 作者 通讯作者(55) Identify OS from encrypted traffic with TCP/IP stack fingerprinting, 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2019, 第 5 作者(56) I Know What You Are Doing With Remote Desktop, 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2019, 第 4 作者(57) Malicious Domain Detection via Domain Relationship and Graph Models, 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2019, 第 6 作者(58) An Overview of Blockchain Security Analysis, CYBER SECURITY, CNCERT 2018, 2019, 第 5 作者 通讯作者(59) FS-Net: A How Sequence Network For Encrypted Traffic Classification, IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019), 2019, 第 3 作者(60) Deep Forest with LRRS Feature for Fine-grained Website Fingerprinting with Encrypted SSL/TLS, PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM '19), 2019, 第 3 作者(61) A Comprehensive Study of Accelerating IPv6 Deployment, 2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2019, 第 5 作者(62) User Behavior Classification in Encrypted Cloud Camera Traffic, 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019, 第 4 作者(63) TLS/SSL Encrypted Traffic Classification with Autoencoder and Convolutional Neural Network, IEEE 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS / IEEE 16TH INTERNATIONAL CONFERENCE ON SMART CITY / IEEE 4TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2018, 第 5 作者(64) LaFFT: Length-Aware FFT Based Fingerprinting for Encrypted Network Traffic Classification, 2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, 第 4 作者(65) Image-Set Based Collaborative Representation for Face Recognition in Videos, ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2017, PT II, 2018, 第 3 作者(66) Classifying User Activities in the Encrypted WeChat Traffic, 2018 IEEE 37TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2018, 第 5 作者(67) Identifying Gambling and Porn Websites with Image Recognition, ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2017, PT II, 2018, 第 3 作者(68) How Is the Forged Certificates in the Wild: Practice on Large-Scale SSL Usage Measurement and Analysis, COMPUTATIONAL SCIENCE - ICCS 2018, PT III, 2018, 第 3 作者 通讯作者(69) Old Habits Die Hard: Fingerprinting Websites on the Cloud, COMPUTATIONAL SCIENCE - ICCS 2018, PT III, 2018, 第 5 作者(70) MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints, 2018 IEEE/ACM 26TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2018, 第 3 作者(71) Auto-identification of Background Traffic Based on Autonomous Periodic Interaction, 2017 IEEE 36TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2017, 第 5 作者(72) Video face recognition through multi-scale and optimization of margin distributions, INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE (ICCS 2017), 2017, 第 3 作者(73) Discovering abnormal behaviors via HTTP header fields measurement, CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 第 3 作者(74) A network attack forensic platform against HTTP evasive behavior, JOURNAL OF SUPERCOMPUTING, 2017, 第 6 作者 通讯作者(75) POSTER: A Comprehensive Study of Forged Certificates in the Wild, CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, 第 3 作者 通讯作者(76) 支持多租户的网络测试床模拟流量标记和溯源模型, Multi-tenant Network Testbed Flow Watermarking and Provenance Tracing Model, 电子学报, 2017, 第 6 作者(77) Identifying Malware with HTTP Content Type Inconsistency via Header-Payload Comparison, 2017 IEEE 36TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2017, 第 5 作者(78) Metric Learning With Statistical Features For Network Traffic Classification, 2017 IEEE 36TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2017, 第 6 作者(79) POSTER: An Empirical Measurement Study on Multi-tenant Deployment Issues of CDNs, CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, 第 3 作者(80) Riemannian Optimization with Subspace Tracking for Low-rank Recovery, 2016 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2016, 第 5 作者(81) 面向网络环境的SQL注入行为检测方法, Approach to detecting SQL injection behaviors in network environment, 通信学报, 2016, 第 2 作者(82) 一种基于数据层的BGP网络前缀分类研究, Research on BGP Preifx Classiifcation Based on Data Panel, 信息网络安全, 2015, 第 3 作者(83) HybridFA:一种基于统计的AC自动机空间优化技术, Hybrid FA: a memory reduction technique for the AC automata based on statistics, 通信学报, 2015, 第 1 作者(84) Two-Phased Method for Detecting Evasive Network Attack Channels, CHINA COMMUNICATIONS, 2014, 第 2 作者 通讯作者(85) Delta-K-2-tree for Compact Representation of Web Graphs, WEB TECHNOLOGIES AND APPLICATIONS, APWEB 2014, 2014, 第 2 作者 通讯作者(86) 基于X.509证书测量的隐私泄露分析, X.509 Certificate Measurement Based Privacy Analysis, 计算机学报, 2014, 第 2 作者(87) A Survey on Encrypted Traffic Classification, APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2014, 2014, 第 2 作者 通讯作者(88) POSTER: Mining Elephant Applications in Unknown Traffic by Service Clustering, CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, 第 3 作者(89) Two-Phased Method for Detecting Evasive Network Attack Channels, Two-Phased Method for Detecting Evasive Network Attack Channels, 中国通信:英文版, 2014, 第 2 作者(90) 图数据表示与压缩技术综述, Survey on Succinct Representation of Graph Data, 软件学报, 2014, 第 3 作者(91) 基于主机行为关联的加密P2P流量实时分类方法, Real-time classification of encrypted P2P traffic based on host behavior association, 高技术通讯, 2013, 第 1 作者(92) A De-anonymize attack method based on traffic analysis, 2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2013, 第 2 作者(93) 基于流分析的加密网络服务分类, 2013, 第 1 作者(94) DNSSEC域名解析的形式化描述及量化分析研究, Formal Description and Quantitative Analysis of DNSSEC Resolution Service, 计算机研究与发展, 2012, 第 4 作者(95) Few-shot encrypted traffic classification via multi-task representation enhanced meta-learning, COMPUTER NETWORKS, 第 2 作者