Följ
Yipeng Wang
Yipeng Wang
Faculty of Information Technology, Beijing University of Technology
Verifierad e-postadress på bjut.edu.cn
Titel
Citeras av
Citeras av
År
A semantics aware approach to automated reverse engineering unknown protocols
Y Wang, X Yun, MZ Shafiq, L Wang, AX Liu, Z Zhang, D Yao, Y Zhang, ...
2012 20th IEEE International Conference on Network Protocols (ICNP), 1-10, 2012
1722012
Inferring protocol state machine from network traces: a probabilistic approach
Y Wang, Z Zhang, D Yao, B Qu, L Guo
Applied Cryptography and Network Security: 9th International Conference …, 2011
1302011
A Semantics-Aware Approach to the Automated Network Protocol Identification
X Yun, Y Wang, Y Zhang, Y Zhou
IEEE/ACM Transactions on Networking 24 (1), 583 - 595, 2016
902016
Biprominer: Automatic mining of binary protocol features
Y Wang, X Li, J Meng, Y Zhao, Z Zhang, L Guo
2011 12th International Conference on Parallel and Distributed Computing …, 2011
522011
Update vs. upgrade: Modeling with indeterminate multi-class active learning
XY Zhang, S Wang, X Zhu, X Yun, G Wu, Y Wang
Neurocomputing 162, 163-170, 2015
462015
Joint character-level word embedding and adversarial stability training to defend adversarial text
H Liu, Y Zhang, Y Wang, Z Lin, Y Chen
Proceedings of the AAAI conference on artificial intelligence 34 (05), 8384-8391, 2020
402020
Khaos: An Adversarial Neural Network DGA with High Anti-Detection Ability
X Yun, J Huang, Y Wang, T Zang, Y Zhou, Y Zhang
IEEE Transactions on Information Forensics and Security 15, 2225-2240, 2020
362020
Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach
Y Chen, T Zang, Y Zhang, Y Zhou, Y Wang
2019 IEEE 27th International Conference on Network Protocols (ICNP), 1-11, 2019
332019
Visual similarity based anti-phishing with the combination of local and global features
Y Zhou, Y Zhang, J Xiao, Y Wang, W Lin
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
332014
Using entropy to classify traffic more deeply
Y Wang, Z Zhang, L Guo, S Li
2011 IEEE Sixth International Conference on Networking, Architecture, and …, 2011
332011
Identifying malicious nodes in wireless sensor networks based on correlation detection
Y Lai, L Tong, J Liu, Y Wang, T Tang, Z Zhao, H Qin
Computers & Security 113, 102540, 2022
282022
Unified graph embedding-based anomalous edge detection
L Ouyang, Y Zhang, Y Wang
2020 International Joint Conference on Neural Networks (IJCNN), 1-8, 2020
202020
Detecting Domain Generation Algorithms with Convolutional Neural Language Models
J Huang, P Wang, T Zang, Q Qiang, Y Wang, M Yu
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
202018
A comprehensive measurement study of domain-squatting abuse
Y Zeng, T Zang, Y Zhang, X Chen, Y Wang
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019
192019
Rethinking Robust and Accurate Application Protocol Identification
Yipeng Wang, Xiaochun Yun, Yongzheng Zhang, Liwei Chen, Tianning Zang
Computer Networks 129 (P1), 64-78, 2017
152017
DEIDS: a novel intrusion detection system for industrial control systems
H Gu, Y Lai, Y Wang, J Liu, M Sun, B Mao
Neural Computing and Applications 34 (12), 9793-9811, 2022
132022
A Multi-scale Feature Attention Approach to Network Traffic Classification and Its Model Explanation
Y Wang, X Yun, Y Zhang, C Zhao, X Liu
IEEE Transactions on Network and Service Management 19 (2), 875 - 889, 2022
132022
A cascade forest approach to application classification of mobile traces
Y Liu, S Zhang, B Ding, X Li, YP Wang
IEEE Wireless Communications and Networking Conference, 1-6, 2018
132018
A Few-shot Learning Based Approach to IoT Traffic Classification
Z Zhao, Y Lai, Y Wang, W Jia, H He
IEEE Communications Letters 26 (3), 537-541, 2022
122022
Rethinking robust and accurate application protocol identification: a nonparametric approach
Y Wang, X Yun, Y Zhang
2015 IEEE 23rd International Conference on Network Protocols (ICNP), 134-144, 2015
122015
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20