- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Spam and Phishing Detection
- Advanced Malware Detection Techniques
- Anomaly Detection Techniques and Applications
- Embedded Systems and FPGA Design
- Network Traffic and Congestion Control
- Advanced Sensor and Control Systems
- Gas Sensing Nanomaterials and Sensors
- Smart Grid Security and Resilience
- Advanced Optical Network Technologies
- Spectroscopy and Laser Applications
- Traffic Prediction and Management Techniques
- User Authentication and Security Systems
- Network Packet Processing and Optimization
- Software-Defined Networks and 5G
- Advanced Algorithms and Applications
- Advanced Research in Systems and Signal Processing
- Hate Speech and Cyberbullying Detection
- IoT and Edge/Fog Computing
- Advanced Sensor Technologies Research
Xi'an Jiaotong University
2020-2024
China Jiliang University
2015
Institute of Information Engineering
2010
Over the years, network traffic analysis and generation have advanced significantly. From traditional statistical methods, field has progressed to sophisticated deep learning techniques. This progress improved ability detect complex patterns security threats, as well test optimize performance. However, obstacles persist, such dependence on labeled data for difficulty of generating samples that follow realistic patterns. Pre-trained neural networks emerged powerful tools resolve these issues,...
With the popularization of Internet Things (IoT) devices in smart home and industry fields, a huge number IoT are connected to Internet. However, what network may not be known by Service Provider (ISP), since many placed within small networks (e.g., networks) hidden behind address translation (NAT). Without pinpointing network, it is unlikely for ISP appropriately configure security policies effectively manage network. In this paper, we design an efficient scalable system via...
With the popularization of Internet Things (IoT) devices in smart home and industry fields, a huge number IoT are connected to Internet. However, what network may not be known by Service Provider (ISP), since many placed within small networks (e.g., networks) hidden behind address translation (NAT). Without pinpointing network, it is unlikely for ISP appropriately configure security policies effectively manage network. Additionally, inferring fine-grained user interactions also an...
Cyber search engines, such as Shodan and Censys, have gained popularity due to their strong capability of indexing the Internet Things (IoT). They actively scan fingerprint IoT devices for unearthing IP-device mapping. Because large address space mapping's mutative nature, efficiently tracking evolution mapping with a limited budget scans is essential building timely cyber engines. An intuitive solution use reinforcement learning schedule more networks high churn rates However, an has never...
Cyber search engines, such as Shodan and Censys, have gained popularity due to their strong capability of indexing the Internet Things (IoT). They actively scan fingerprint IoT devices for unearthing IP-device mapping. Because large address space mapping's mutative nature, efficiently tracking evolution mapping with a limited budget scans is essential building timely cyber engines. An intuitive solution use reinforcement learning schedule more networks high churn rates However, an has never...
Many malicious activities require a large number of IP addresses for altering user identities. It is well known that could be obtained through compromising numerous machines and building botnets. However, we recently found special type off-the-shelf virtual private server (VPS), which refer to as dynamic VPSs, can retrieve huge using just single machine. Although VPSs are intended legitimate purposes, whether they actually misused in has never been investigated. In this article, take the...
Domain Name System (DNS) is indispensable to the daily operation of all Internet services, computer programs, smartphones, etc. It has been commonly explored as a vantage point for network monitoring. However, fundamental question that whether DNS query originating from querent issued by humans or software entities remains not deeply investigated. Tackling such enables us further passively discover uses traffic. In this paper, we systematically perform querent-centric modeling and explore...
An optimized gas chamber structure is determined based on orthogonal experiment and numerical simulation combination method.The optimization of NDIR automobile exhaust sensor includes three factors:gas diameter, length opening way.By the experiment,it shown that has advantage good detection stability fast response time.For example,the improved by 25.7% time 38%,when detected main component CO2(12.5%).
Website fingerprinting (WFP) could infer which websites a user is accessing via an encrypted proxy by passively inspecting the traffic characteristics of different between and proxy. Designing WFP attacks crucial for understanding potential vulnerabilities proxies, guides design defensive measures against WFP. In this paper, we novel attack (popular) proxies that relay connections individually (e.g., Shadowsocks, V2Ray), accordingly implement lightweight countermeasures to effectively defend...
In recent years, a new type of DDoS attacks against backbone routing links have appeared. They paralyze the communication network large area by directly congesting key concerning accessibility area. This make it difficult for traditional countermeasures to take effect. paper proposes and implements an attack detection method based on non-cooperative active measurement. Experiments show that our can efficiently perceive changes link performance assist in identifying such attacks. testbed,...