Ruijie Zhao

ORCID: 0000-0001-6168-8687
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Malware Detection Techniques
  • Anomaly Detection Techniques and Applications
  • EEG and Brain-Computer Interfaces
  • Digital and Cyber Forensics
  • Spam and Phishing Detection
  • Advanced Neural Network Applications
  • Blind Source Separation Techniques
  • User Authentication and Security Systems
  • Non-Invasive Vital Sign Monitoring
  • Adversarial Robustness in Machine Learning
  • Intellectual Property and Patents
  • Augmented Reality Applications
  • Micro and Nano Robotics
  • Gaze Tracking and Assistive Technology
  • Electrohydrodynamics and Fluid Dynamics
  • Power Systems Fault Detection
  • Machine Learning in Materials Science
  • Data Management and Algorithms
  • Experimental Learning in Engineering
  • Power Systems and Renewable Energy
  • Engineering Education and Technology
  • ECG Monitoring and Analysis
  • Innovation Policy and R&D

Shanghai Jiao Tong University
2018-2024

Shenzhen Technology University
2023-2024

China Telecom (China)
2023

China Telecom
2023

Shenzhen University
2023

Sun Yat-sen University
2020-2021

Laboratoire de Réactivité et Chimie des Solides
2020

Université de Picardie Jules Verne
2020

Centre National de la Recherche Scientifique
2020

Centre de recherche en psychologie : cognition, psychisme et organisations
2020

The purpose of a network intrusion detection (NID) is to detect intrusions in the network, which plays critical role ensuring security Internet Things (IoT). Recently, deep learning (DL) has achieved great success field detection. However, limited computing capabilities and storage IoT devices hinder actual deployment DL-based high-complexity models. In this article, we propose novel NID method for based on lightweight neural (LNN). data preprocessing stage, avoid high-dimensional raw...

10.1109/jiot.2021.3119055 article EN IEEE Internet of Things Journal 2021-10-11

The proliferation of wireless sensor networks (WSNs) and their applications has attracted remarkable growth in unsolicited intrusions security threats, which disrupt the normal operations WSNs. Deep learning (DL)-based network intrusion detection (NID) methods have been widely investigated developed. However, high computational complexity DL seriously hinders actual deployment DL-based model, particularly devices WSNs that do not powerful processing performance due to power limitation. In...

10.1109/lwc.2021.3077946 article EN IEEE Wireless Communications Letters 2021-05-06

Federated learning (FL) has become an increasingly popular solution for intrusion detection to avoid data privacy leakage in Internet of Things (IoT) edge devices. Existing FL-based methods, however, suffer from three limitations: 1) model parameters transmitted each round may be used recover private data, which leads security risks; 2) not independent and identically distributed (non-IID) seriously adversely affect the training FL (especially distillation-based FL); 3) high communication...

10.1109/jiot.2022.3175918 article EN IEEE Internet of Things Journal 2022-05-18

Traffic classification is a critical task in network security and management. Recent research has demonstrated the effectiveness of deep learning-based traffic method. However, following limitations remain: (1) representation simply generated from raw packet bytes, resulting absence important information; (2) model structure directly applying learning algorithms does not take characteristics into account; (3) scenario-specific classifier training usually requires labor-intensive...

10.1609/aaai.v37i4.25674 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2023-06-26

With the development of Industrial Internet Things (IIoT), complex traffic generated by large-scale IIoT devices presents challenges for analysis. Most existing deep learning-based analysis methods use a single flow classification, resulting in being misled irrelevant flow. Thus, it is necessary to sequences However, models fail effectively distinguish unimportant flows sequence, which affects classification performance. To address aforementioned challenges, we propose novel classifier...

10.1109/tii.2023.3241689 article EN IEEE Transactions on Industrial Informatics 2023-02-02

With the increasing demand for protection of personal network meta-data, encrypted networks have grown in popularity, so do challenge monitoring and analyzing traffic. Currently, some deep learning-based methods been proposed to leverage statistical features traffic classification, which are barely affected by encryption techniques. However, these works still suffer from two main intrinsic limitations: (1) feature extraction process lacks a mechanism take into account correlations between...

10.1145/3534678.3539314 article EN Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining 2022-08-12

The pervasive deployment of the Internet Things (IoT) has significantly facilitated manufacturing and living. diversity continual updates IoT systems make their security a crucial challenge, among which detection malicious network traffic turns out to be most common yet destructive threat. Despite efforts on feature engineering classification backend designing, established intrusion sometimes lack robustness are inflexible against shift distribution. To deal with these disadvantages, we...

10.1109/tfuzz.2022.3165390 article EN IEEE Transactions on Fuzzy Systems 2022-04-06

With the increased need for clean water and decreased supply of fresh water, purification contaminated can provide that supplements from nature. Physical adsorption, photo-degradation solar-driven evaporation processes are promising ways to generate with minimum environmental impact. However, different process requires dispersion state treating agent maximize its performance. Herein, we demonstrate Fe3O4-reduced graphene oxide (MrGO) particles switchable be used as multifunctional agents...

10.1016/j.pnsc.2018.05.005 article EN cc-by-nc-nd Progress in Natural Science Materials International 2018-08-01

Backdoor attacks have emerged as an urgent threat to Deep Neural Networks (DNNs), where victim DNNs are furtively implanted with malicious neurons that could be triggered by the adversary. To defend against backdoor attacks, many works establish a staged pipeline remove backdoors from DNNs: inspecting, locating, and erasing. However, in scenario few clean data can accessible, such is fragile cannot erase completely without sacrificing model accuracy. address this issue, paper, we propose...

10.1145/3579856.3582822 article EN 2023-07-05

With the ubiquitous network applications and continuous development of attack technology, all social circles have paid close attention to cyberspace security. Intrusion detection systems (IDS) plays a very important role in ensuring computer communication Recently, deep learning has achieved great success field intrusion detection. However, high computational complexity poses major hurdle for practical deployment DL-based models. In this paper, we propose novel approach based on lightweight...

10.1109/wcnc49053.2021.9417568 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2021-03-29

Identifying anonymity services from network traffic is a crucial task for management and security. Currently, some works based on deep learning have achieved excellent performance analysis, especially those flow sequence (FS), which utilizes information features of the flow. However, these models still face serious challenge because lacking mechanism to take into account relationships between flows, resulting in mistakenly recognizing irrelevant flows FS as clues identifying traffic. In this...

10.1109/iwqos54832.2022.9812882 article EN 2022-06-10

When a liquid droplet is placed on sufficiently hot surface, it will be levitated by the vapor cushion between and surface due to Leidenfrost effect. Such Leidenfrost-based levitation can greatly reduce friction thus offers promising approach for low-friction devices. In this work, we demonstrated self-propelled rotational rotor made of wet paper with asymmetric mass distribution. The has shown capability reaching angular velocities more than 30 rad/s prolonged rotation duration through...

10.1063/1.5084231 article EN Applied Physics Letters 2019-03-18

Container technology has become a popular development that can conveniently accelerate building, running, and sharing applications. However, container image packaging collection of software usually lurks various defects threatening consumer safety, such as embedded malware, vulnerability, privacy leakage, etc. Moreover, developers users share images through centralized, public, massive repository (e.g., Docker Hub), which magnify the impact these security in fast-spreading way....

10.1016/j.jisa.2022.103351 article EN cc-by-nc-nd Journal of Information Security and Applications 2022-10-28

Traffic classification is a critical task in network security and management. Recent research has demonstrated the effectiveness of deep learning-based traffic method. However, following limitations remain: (1) representation simply generated from raw packet bytes, resulting absence important information; (2) model structure directly applying learning algorithms does not take characteristics into account; (3) scenario-specific classifier training usually requires labor-intensive...

10.1109/tnet.2023.3335253 article EN IEEE/ACM Transactions on Networking 2024-01-03

Network intrusion detection (NID) is an important cyber security scheme to identify attacks in network traffic. Recent years, a large amount of studies try improve the accuracy NID by kinds deep learning approaches. However, these models always require lot calculation and space, which constitutes major hurdle practical implementation DL-based models. Thus, lightweight model imperative, but there are very few applications algorithms In this paper, we propose knowledge distillation (LKD) for...

10.1109/icc42927.2021.9500574 article EN ICC 2022 - IEEE International Conference on Communications 2021-06-01

Although text-based captcha, which is used to differentiate between human users and bots, has faced many attack methods, it remains a widely security mechanism employed by some websites. Some deep learning-based text captcha solvers have shown excellent results, but the labor-intensive time-consuming labeling process severely limits their viability. Previous works attempted create easy-to-use using limited collection of labeled data. However, they are hampered inefficient preprocessing...

10.1109/sp46215.2023.10179379 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2023-05-01

Electrocorticogram (ECoG) is an effective way for Epilepsy research, as well automatic seizure detection. This study proposes a method feature extraction and classification of pre-ictal ictal ECoGs, based upon mutual information (MI) support vector machine (SVM) which has not only high accuracy but also fast speed. First, the among 76 channels computed converted into 76×76 matrix, then statistical significance splicing between ECoGs tested, coefficients variation fluctuation indexes MI...

10.1109/icsigsys.2017.7967043 article EN 2017-05-01

Supervising anonymity network is a critical issue in the field of security, and traditional traffic analysis methods cannot cope with complex traffic. In recent years, method based on deep learning has achieved good performance. However, most existing studies do not consider temporal-spatial correlation traffic, only use single flow for classification. A few works take continuous flows as sequence classification, but they distinguish different importance each flow. To tackle this issue, we...

10.1109/msn53354.2021.00045 article EN 2021 17th International Conference on Mobility, Sensing and Networking (MSN) 2021-12-01

To detect the start time and end of each action in an untrimmed video Track 3 AI City Challenge, this paper proposes a powerful network architecture, Multi-Attention Transformer. The previous methods extract features by setting fixed sliding window whitch means interval, predict times action. We believe that adopting series windows will corrupt feature containing contextual information. So we present transformer module which combines local attention global to fix problem. method equipped...

10.1109/cvprw59228.2023.00574 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) 2023-06-01

Federated learning (FL) has become an increasingly popular solution for intrusion detection to avoid data privacy leakage in Internet of Things (IoT) edge devices. However, most the current FL-based methods still suffer from three limitations: (1) model parameters transmitted each round may be used recover private which leads security risks, (2) not independent and identically distributed (non-IID) seriously adversely affects training FL (especially distillation-based FL), (3) high...

10.1109/icc45855.2022.9838256 article EN ICC 2022 - IEEE International Conference on Communications 2022-05-16

With the development of Industrial Internet Things (IIoT), more frequent attacks occur to intrude IIoT devices. A reasonably designed intrusion detection method can effectively guarantee security IIoT. Over past decade, different methods based on deep learning (DL) have been proposed, which helps keep evolving and become robust. However, these previous researches usually require participation a large number experts, gradually invalid with continuous methods. The limited compute capability...

10.1109/icc45855.2022.9838567 article EN ICC 2022 - IEEE International Conference on Communications 2022-05-16
Coming Soon ...