Jingguo Ge

ORCID: 0000-0002-6648-324X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Software-Defined Networks and 5G
  • Internet Traffic Analysis and Secure E-voting
  • Caching and Content Delivery
  • Software System Performance and Reliability
  • Network Traffic and Congestion Control
  • Opportunistic and Delay-Tolerant Networks
  • Anomaly Detection Techniques and Applications
  • Cloud Computing and Resource Management
  • IPv6, Mobility, Handover, Networks, Security
  • Advanced Data Storage Technologies
  • Network Packet Processing and Optimization
  • Blockchain Technology Applications and Security
  • Smart Grid Security and Resilience
  • Advanced Malware Detection Techniques
  • Mobile Agent-Based Network Management
  • Advanced Optical Network Technologies
  • Interconnection Networks and Systems
  • Advanced Memory and Neural Computing
  • Spam and Phishing Detection
  • Cooperative Communication and Network Coding
  • Peer-to-Peer Network Technologies
  • Software Engineering Research
  • Topic Modeling
  • Mobile Ad Hoc Networks

Institute of Information Engineering
2016-2025

University of Chinese Academy of Sciences
2009-2025

Chinese Academy of Sciences
2016-2025

University of Exeter
2022

Computer Network Information Center
2002-2016

Shanghai Jiao Tong University
2004

Virtual network embedding arranges virtual services onto substrate components. The performance of algorithms determines the effectiveness and efficiency a virtualized network, making it critical part virtualization technology. To achieve better performance, algorithm needs to automatically detect status which is complicated changes in time-varying manner, dynamically provide solutions that can best fit current status. However, most existing fail automatic an acceptable running time. In this...

10.1109/jsac.2020.2986662 article EN IEEE Journal on Selected Areas in Communications 2020-04-08

With the rapidly emerging encryption techniques for network traffic, classification of encrypted traffic has increasingly become significantly important in management and security. In this paper, we propose a novel deep neural that combines both convolutional recurrent to improve accuracy results. The is used extract packet features single packet. trained pick out flow based on inputs any three consecutive packets flow. proposed model surpasses existing studies which ask first flow, it...

10.1109/hpcc/smartcity/dss.2018.00074 article EN 2018-06-01

Penetration testing is a vital practice for identifying and mitigating vulnerabilities in cybersecurity systems, but its manual execution labor-intensive time-consuming. Existing large language model (LLM)-assisted or automated penetration approaches often suffer from inefficiencies, such as lack of contextual understanding excessive, unstructured data generation. This paper presents VulnBot, an framework that leverages LLMs to simulate the collaborative workflow human teams through...

10.48550/arxiv.2501.13411 preprint EN arXiv (Cornell University) 2025-01-23

10.1109/icassp49660.2025.10887868 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

10.1109/icassp49660.2025.10890690 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

The widespread use of encryption protocols and increasing privacy demands have significantly increased encrypted traffic, creating new challenges for network monitoring threat detection. Current methods struggle with diverse scenarios distinguish between subtle traffic patterns within webpages the same application. To address these challenges, we introduce ANT-ET, an end-to-end multimodal framework designed fine-grained webpage fingerprinting. ANT-ET leverages a transformer to model payload...

10.1177/0926227x251325484 article EN other-oa Journal of Computer Security 2025-03-28

Communication networks are becoming increasingly complex toward 6G. Manual management is no longer an option for network operators. Network automation has been widely discussed in the networking community, and it a sensible means to manage communication network. Deep learning models developed enable given operation practices have limitations of lack explainability inapplicability across different and/or settings. To tackle above issues, this article we propose new knowledge-powered framework...

10.1109/mnet.005.2100541 article EN IEEE Network 2022-05-01

With the rapid development of Internet, more and devices are being connected to making up Internet-of-Things (IoT). The accountability privacy two important but contradictory factors ensure security IoT networks. How provide an accountable anonymous access networks is a challenging task. Since network largely driven by services, in this paper we propose new efficient architecture achieve based on services. In architecture, self-certifying identifier proposed efficiently identify service....

10.1109/access.2018.2806483 article EN cc-by-nc-nd IEEE Access 2018-01-01

10.1007/s00170-004-2070-2 article EN The International Journal of Advanced Manufacturing Technology 2004-11-03

Summary OpenFlow has become the key standard and technology for software defined networking, which been widely adopted in various environments. However, global deployment of encountered several issues, such as increasing number fields complex structure flow entries, making size table switches explosively grows, results hardware implementation difficulty. To this end, paper presents modelling on minimisation storage space proposes a Heuristic Storage Optimisation algorithm Flow Table (H‐SOFT)...

10.1002/cpe.3206 article EN Concurrency and Computation Practice and Experience 2014-01-14

Virtual network embedding (VNE) that instantiates virtualized networks on a substrate infrastructure, is one of the key research problems for virtualization. Most existing VNE approaches, however, focus current virtual request (VNR) and treat all VNRs equally, which disregard long-term impact waste many resources process infeasible (i.e., cannot be embedded completely). To address these problems, proactive algorithm based hierarchical reinforcement learning, VNE-HRL, proposed in this paper....

10.1109/tnsm.2021.3120297 article EN IEEE Transactions on Network and Service Management 2021-10-15

Logs are used to record runtime states and significant events for a software system. They widely anomaly detection. produced by most of the real-world systems show clear characteristics imbalanced data because number samples in different classes varies sharply. The distribution makes classifier bias toward majority class, so it is difficult learn detect anomalies correctly. Most existing methods log-based detection ignore this important problem, they perform poorly on systems. In paper, we...

10.1109/hpcc-smartcity-dss50907.2020.00055 article EN 2020-12-01

In recent years, attacks on the DNS continue to proliferate due lack of security mechanisms. over HTTPS (DoH) is a standard developed for encrypting plaintext protect user privacy, but attackers may use this protocol bypass enterprise firewalls and exfiltrate private data through establishment tunnels. Traditional tunnel detection methods based packet inspection are no longer applicable because encryption. Although popular machine learning widely used, it require expert knowledge extract...

10.1109/ispa-bdcloud-socialcom-sustaincom52081.2021.00056 article EN 2021-09-01

In this paper, a PbD (Programming by Demonstration) experiment platform is setup based on dual arm robot and an motion tracking system. A method optical system implemented tested platform. This uses sensor to capture operator arms then let imitate motion. At the same time, logged, optimized program generated automatically computing device or controller itself. It can speed up programming reduce learning difficulty of greatly just demonstrating action sequences robot, furthermore, it save...

10.1109/isr.2013.6695708 article EN 2013-10-01

Multicast transmission can effectively reduce the cost of network resources in delivering packets to a group receivers. However, it is difficult adjust path generated multicast spanning tree (MST) if source and members are unchanged. OpenFlow has been key technology realize software defined networking makes flow control feasible. This paper presents an OpenFlow-based solution dynamically MST by configuring paths according requirements loads specific conditions. In addition, we propose...

10.1109/trustcom.2013.179 article EN 2013-07-01

10.1016/j.jpdc.2019.06.002 article EN Journal of Parallel and Distributed Computing 2019-06-13
Coming Soon ...