Gaofeng He

Orcid: 0000-0002-5493-6440

According to our database1, Gaofeng He authored at least 32 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Sketch-Based Fine-Grained Proportional Integral Queue Management Method.
Axioms, September, 2024

2023
Architecture-oriented security strategy determination for cyber-physical systems.
Concurr. Comput. Pract. Exp., 2023

2022
Introducing Additional Network Measurements into Active Queue Management.
Proceedings of the IEEE International Conference on Communications, 2022

Secure and Efficient Traffic Obfuscation for Smart Home.
Proceedings of the IEEE Global Communications Conference, 2022

One-Shot Detection of Malicious TLS Traffic.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

Analysis Method of Security Critical Components of Industrial Cyber Physical System based on SysML.
Proceedings of the Tenth International Conference on Advanced Cloud and Big Data, 2022

A Hybrid Attack Graph Analysis Method based on Model Checking.
Proceedings of the Tenth International Conference on Advanced Cloud and Big Data, 2022

2021
ME-Box: A reliable method to detect malicious encrypted traffic.
J. Inf. Secur. Appl., 2021

Preventing IoT DDoS Attacks using Blockchain and IP Address Obfuscation.
Proceedings of the 13th International Conference on Wireless Communications and Signal Processing, 2021

Odd-Even Hash Algorithm: A Improvement of Cuckoo Hash Algorithm.
Proceedings of the Ninth International Conference on Advanced Cloud and Big Data, 2021

2020
A Minimum Defense Cost Calculation Method for Attack Defense Trees.
Secur. Commun. Networks, 2020

On-Device Detection of Repackaged Android Malware via Traffic Clustering.
Secur. Commun. Networks, 2020

SA Sketch: A self-adaption sketch framework for high-speed network.
Concurr. Comput. Pract. Exp., 2020

OEBSA-Sketch: a Combination of Sketch and Hash Table for the Measurement of Stream Data.
Proceedings of the Eighth International Conference on Advanced Cloud and Big Data, 2020

Optimal Defense Policies for Cost-Constrained Cyber Physical System.
Proceedings of the Eighth International Conference on Advanced Cloud and Big Data, 2020

2019
基于状态事件故障树的信息物理融合系统风险建模 (Risk Modeling for Cyber-physical Systems Based on State/Event Fault Trees).
计算机科学, 2019

Research on Fault Extraction Method of Variational Mode Decomposition Based on Immunized Fruit Fly Optimization Algorithm.
Entropy, 2019

A Novel Method for Intelligent Fault Diagnosis of Bearing Based on Capsule Neural Network.
Complex., 2019

Application of an Improved Ensemble Local Mean Decomposition Method for Gearbox Composite Fault Diagnosis.
Complex., 2019

A Novel Fault Diagnosis Method of Gearbox Based on Maximum Kurtosis Spectral Entropy Deconvolution.
IEEE Access, 2019

Application of Parameter Optimized Variational Mode Decomposition Method in Fault Diagnosis of Gearbox.
IEEE Access, 2019

CBFSketch: A Scalable Sketch Framework for High Speed Network.
Proceedings of the Seventh International Conference on Advanced Cloud and Big Data, 2019

A Minimum Defense Cost Calculation Method for Cyber Physical System.
Proceedings of the Seventh International Conference on Advanced Cloud and Big Data, 2019

2018
AppFA: A Novel Approach to Detect Malicious Android Applications on the Network.
Secur. Commun. Networks, 2018

基于攻击图的信息物理融合系统渗透测试方法 (Penetration Testing Method for Cyber-Physical System Based on Attack Graph).
计算机科学, 2018

Mobile app identification for encrypted network flows by traffic correlation.
Int. J. Distributed Sens. Networks, 2018

Spotting review spammer groups: A cosine pattern and network based method.
Concurr. Comput. Pract. Exp., 2018

2017
Identifying Mobile Applications for Encrypted Network Traffic.
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017

2015
A novel application classification attack against Tor.
Concurr. Comput. Pract. Exp., 2015

2014
A novel active website fingerprinting attack against Tor anonymous system.
Proceedings of the IEEE 18th International Conference on Computer Supported Cooperative Work in Design, 2014

A Novel Method to Detect Encrypted Data Exfiltration.
Proceedings of the Second International Conference on Advanced Cloud and Big Data, 2014

Inferring Application Type Information from Tor Encrypted Traffic.
Proceedings of the Second International Conference on Advanced Cloud and Big Data, 2014


  Loading...