• Publications
  • Influence
A light-weight trust-based QoS routing algorithm for ad hoc networks
TLDR
In a mobile ad hoc network (MANET), the lack of a trusted infrastructure makes secure and reliable packet forwarding very challenging, especially for providing QoS guarantee for multimedia applications. Expand
A Deep Learning Based Fast-Flux and CDN Domain Names Recognition Method
TLDR
This paper proposes a method called Fast-flux and CDN Domains Recognizer (FCDR) to self-learning FF andCDN features and recognition them based on LSTM network. Expand
MFRdnsI: A DNS Recursive Server Identification and Classification Method Based on Deep Learning
TLDR
We propose a recursive server identification method based on deep learning called MFRdnsI, which analysis the traffic direction characteristics, traffic statistics features and protocol field features in the DNS resolving records and uses multi-layer perceptron for automatic learning of multidimensional features. Expand
An Efficient Approach to Event Detection and Forecasting in Dynamic Multivariate Social Media Networks
TLDR
We generalize traditional nonparametric statistics, and propose a class of scan statistic functions for measuring the joint significance of evolving subgraphs and subsets of attributes to indicate the ongoing or forthcoming event in dynamic multivariate networks. Expand
Detecting Information Theft Based on Mobile Network Flows for Android Users
TLDR
We propose a detection model based on the analysis of relationships between behavior patterns and network flows, which achieves our goal by using the Random Forest machine learning algorithm to classify the network flows into benign or malicious. Expand
An Efficient Framework for Detecting Evolving Anomalous Subgraphs in Dynamic Networks
TLDR
This paper proposes an efficient framework, named dGraphScan, for evolving anomalous subgraphs detection in dynamic networks based on nonparametric scan statistics. Expand
A Comprehensive Measurement Study of Domain-Squatting Abuse
TLDR
Domain-squatting abuse refers to the premeditated attempt by an attacker to register perceptively confusing domain names thereby tricking visitors into querying them. Expand
WM+: An Optimal Multi-pattern String Matching Algorithm Based on the WM Algorithm
TLDR
The WM algorithm, designed by Sun Wu and Udi Manber, is considered the fastest multi-pattern string matching algorithm in practice except when the pattern number is very large or the alphabet size is small. Expand
An efficient trust-based opportunistic routing for ad hoc networks
TLDR
A new trusted opportunistic forwarding model based on degree of trust and cost of routing is proposed, then a trusted minimum cost routing algorithm is formally formulated. Expand
A Linguistics-based Stacking Approach to Disposable Domains Detection
TLDR
In this paper, we propose Vogers, a linguistics-based stacking model, to detect the disposable domains. Expand
...
1
2
3
...