Chengwei Peng

Orcid: 0009-0005-8953-2381

According to our database1, Chengwei Peng authored at least 16 papers between 2017 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Face swapping detection based on identity spatial constraints with weighted frequency division.
Multim. Syst., April, 2023

Adversarial Attack and Defense for Dehazing Networks.
CoRR, 2023

2022
SDTP: Semantic-Aware Decoupled Transformer Pyramid for Dense Image Prediction.
IEEE Trans. Circuits Syst. Video Technol., 2022

AtNet: A Novel Anti-tracking Network with Multi-Party Judgement Capability Based on Cross-Domain Small-World Topology.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

Anomaly detection of traffic session based on graph neural network.
Proceedings of the 2022 International Conference on Cyber Security, 2022

Evading Encrypted Traffic Classifiers by Transferable Adversarial Traffic.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022

2021
Style transfer for unsupervised domain-adaptive person re-identification.
Neurocomputing, 2021

Learning domain invariant and specific representation for cross-domain person re-identification.
Appl. Intell., 2021

Exploiting Heterogeneous Information for IoT Device Identification Using Graph Convolutional Network.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

2020
Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network.
Proceedings of the Computational Science - ICCS 2020, 2020

2019
Unsupervised Cross-Domain Person Re-identification Based on Style Transfer.
Proceedings of the Intelligent Computing Theories and Application, 2019

2018
MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

MalShoot: Shooting Malicious Domains Through Graph Embedding on Passive DNS Data.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

2017
Discovering Malicious Domains through Alias-Canonical Graph.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Detecting DNS Tunnel through Binary-Classification Based on Behavior Features.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

ProNet: Toward Payload-Driven Protocol Fingerprinting via Convolutions and Embeddings.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017


  Loading...