• Publications
  • Influence
An Effective Conversation-Based Botnet Detection Method
TLDR
We propose an efficient botnet traffic detection system which can handle network bandwidths under the high-speed network environment. Expand
  • 24
  • 3
  • PDF
Multi-party quantum private comparison protocol based on $$d$$d-dimensional entangled states
TLDR
In this paper, we present a novel quantum private comparison protocol with $$l$$l-party and $$d$$d-dimensional entangled states, with the help of a semi-honest third party. Expand
  • 32
  • 2
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning
TLDR
In the current intranet environment, information is becoming more readily accessed and replicated across a wide range of interconnected systems. Expand
  • 8
  • 2
Modeling Attack Process of Advanced Persistent Threat Using Network Evolution
TLDR
We propose a Targeted Complex Attack Network (TCAN) model for APT attack process based on dynamic attack graph and network evolution. Expand
  • 9
  • 1
  • PDF
Identifying APT Malware Domain Based on Mobile DNS Logging
TLDR
We propose an efficient approach to detect APT malware C&C domain with high accuracy by analyzing DNS logs. Expand
  • 55
  • 1
  • PDF
Weighted Domain Transfer Extreme Learning Machine and Its Online Version for Gas Sensor Drift Compensation in E-Nose Systems
TLDR
We extended Target Domain Adaptation Extreme Learning Machine (DAELM_T) to achieve high accuracy with less labeled samples by proposing a Weighted Domain Transfer Extreme learning Machine, which uses clustering information as prior knowledge to help select proper labeled samples. Expand
  • 7
  • 1
  • PDF
Tor anonymous traffic identification based on gravitational clustering
TLDR
The anonymous communication technology has brought new challenges to traffic analysis since it creates a private network pathway. Expand
  • 9
Online Sensor Drift Compensation for E-Nose Systems Using Domain Adaptation and Extreme Learning Machine
TLDR
We focus on building online drift compensation model by transforming two domain adaptation based methods into their online learning versions, which allow the recognition models to adapt to the changes of sensor responses in a time-efficient manner without losing the high accuracy. Expand
  • 11
  • PDF
A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification
TLDR
In recent years, malware with strong concealment uses encrypted protocol to evade detection. Expand
  • 7
Modeling Attack Process of Advanced Persistent Threat
TLDR
We propose a Targeted Complex Attack Network (TCAN) model for APT attack process that addresses human factor by conducting two-layer network structure and dynamic evolution rules. Expand
  • 3