ERNN: Error-resilient RNN for encrypted traffic detection towards network-induced phenomena Z Zhao, Z Li, J Jiang, F Yu, F Zhang, C Xu, X Zhao, R Zhang, S Guo IEEE Transactions on Dependable and Secure Computing, 2023 | 16 | 2023 |
I RNN: An Incremental and Interpretable Recurrent Neural Network for Encrypted Traffic Classification Z Song, Z Zhao, F Zhang, G Xiong, G Cheng, X Zhao, S Guo, B Chen IEEE Transactions on Dependable and Secure Computing, 2023 | 13 | 2023 |
SAGE: steering the adversarial generation of examples with accelerations Z Zhao, Z Li, F Zhang, Z Yang, S Luo, T Li, R Zhang, K Ren IEEE Transactions on Information Forensics and Security 18, 789-803, 2023 | 10 | 2023 |
Purifier: Defending data inference attacks via transforming confidence scores Z Yang, L Wang, D Yang, J Wan, Z Zhao, EC Chang, F Zhang, K Ren Proceedings of the AAAI Conference on Artificial Intelligence 37 (9), 10871 …, 2023 | 8 | 2023 |
DDoS family: A novel perspective for massive types of DDoS attacks Z Zhao, Z Li, Z Zhou, J Yu, Z Song, X Xie, F Zhang, R Zhang Computers & Security 138, 103663, 2024 | 7 | 2024 |
SmartFast: an accurate and robust formal analysis tool for Ethereum smart contracts Z Li, S Lu, R Zhang, R Xue, W Ma, R Liang, Z Zhao, S Gao Empirical Software Engineering 27 (7), 197, 2022 | 7 | 2022 |
Effective DDoS mitigation via ML-driven in-network traffic shaping Z Zhao, Z Liu, H Chen, F Zhang, Z Song, Z Li IEEE Transactions on Dependable and Secure Computing, 2024 | 4 | 2024 |
CMD: co-analyzed iot malware detection and forensics via network and hardware domains Z Zhao, Z Li, J Yu, F Zhang, X Xie, H Xu, B Chen IEEE Transactions on Mobile Computing, 2023 | 4 | 2023 |
Work-in-progress: Towards real-time IDS via RNN and programmable switches co-designed approach Z Zhao, Z Li, Z Song, F Zhang 2023 IEEE Real-Time Systems Symposium (RTSS), 431-434, 2023 | 3 | 2023 |
Poster: Detecting adversarial examples hidden under watermark perturbation via usable information theory Z Zhao, Z Li, T Li, Z Song, F Zhang, R Zhang Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 3 | 2023 |
DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining X Ling, J Yu, Z Zhao, Z Zhou, H Xu, B Chen, F Zhang International Conference on Applied Cryptography and Network Security, 283-309, 2024 | 1 | 2024 |
VulHunter: Hunting Vulnerable Smart Contracts at EVM bytecode-level via Multiple Instance Learning Z Li, S Lu, R Zhang, Z Zhao, R Liang, R Xue, W Li, F Zhang, S Gao IEEE Transactions on Software Engineering, 2023 | 1 | 2023 |
metaNet: Interpretable unknown mobile malware identification with a novel meta-features mining algorithm Z Li, Z Zhao, R Zhang, H Lu, W Li, F Zhang, S Lu, R Xue Computer Networks 250, 110563, 2024 | | 2024 |
Improving Model Robustness against Adversarial Examples with Redundant Fully Connected Layer Z Zhao, Z Li, T Li, J Yu, F Zhang, R Zhang Companion Proceedings of the ACM on Web Conference 2024, 529-532, 2024 | | 2024 |
Task-Driven Quantum Device Fingerprint Identification via Modeling QNN Outcome Shift Induced by Quantum Noise T Li, Z Zhao, J Yin Companion Proceedings of the ACM on Web Conference 2024, 557-560, 2024 | | 2024 |
Trident: A Universal Framework for Fine-Grained and Class-Incremental Unknown Traffic Detection Z Zhao, Z Li, Z Song, W Li, F Zhang Proceedings of the ACM on Web Conference 2024, 1608-1619, 2024 | | 2024 |
An Automated Alert Cross-Verification System with Graph Neural Networks for IDS Events L Li, Y He, F Huang, Z Zhao, Z Song, T Zhou, Z Li, F Zhang 2024 27th International Conference on Computer Supported Cooperative Work in …, 2024 | | 2024 |
基于流谱理论的 SSL/TLS 协议攻击检测方法 郭世泽, 张帆, 宋卓学, 赵子鸣, 赵新杰, 王小娟, 罗向阳 网络与信息安全学报 8 (1), 30-40, 2022 | | 2022 |