Gaopeng Gou

According to our database1, Gaopeng Gou authored at least 40 papers between 2011 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Survey of security supervision on blockchain from the perspective of technology.
J. Inf. Secur. Appl., 2021

Combating Imbalance in Network Traffic Classification Using GAN Based Oversampling.
Proceedings of the IFIP Networking Conference, 2021

2020
A Survey of Key Technologies for Constructing Network Covert Channel.
Secur. Commun. Networks, 2020

NSA-Net: A NetFlow Sequence Attention Network for Virtual Private Network Traffic Detection.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

Identifying DApps and User Behaviors on Ethereum via Encrypted Traffic.
Proceedings of the Security and Privacy in Communication Networks, 2020

TransNet: Unseen Malware Variants Detection Using Deep Transfer Learning.
Proceedings of the Security and Privacy in Communication Networks, 2020

6VecLM: Language Modeling in Vector Space for IPv6 Target Generation.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Applied Data Science Track, 2020

6GCVAE: Gated Convolutional Variational Autoencoder for IPv6 Target Generation.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

MalFinder: An Ensemble Learning-based Framework For Malicious Traffic Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

WF-GAN: Fighting Back Against Website Fingerprinting Attack Using Adversarial Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

ResTor: A Pre-Processing Model for Removing the Noise Pattern in Flow Correlation.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Not Afraid of the Unseen: a Siamese Network based Scheme for Unknown Traffic Discovery.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

JumpEstimate: a Novel Black-box Countermeasure to Website Fingerprint Attack Based on Decision-boundary Confusion.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

FLAGB: Focal Loss based Adaptive Gradient Boosting for Imbalanced Traffic Classification.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

MTLH: Video QoE Monitoring for Encrypted Traffic via Multi-Task Learning with Hierarchy.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Towards Aggregated Features: A Novel Proxy Detection Method Using NetFlow Data.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

PST: a More Practical Adversarial Learning-based Defense Against Website Fingerprinting.
Proceedings of the IEEE Global Communications Conference, 2020

Mining the Characteristics of the Ethereum P2P Network.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

Joint Analysis of Port and Protocol via Endpoint Measurement: An Empirical Study.
Proceedings of the 21st Asia-Pacific Network Operations and Management Symposium, 2020

2019
An Empirical Analysis of Plugin-Based Tor Traffic over SSH Tunnel.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

I Know What You Are Doing With Remote Desktop.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Malicious Domain Detection via Domain Relationship and Graph Models.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Identify OS from encrypted traffic with TCP/IP stack fingerprinting.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

A Comprehensive Study of Accelerating IPv6 Deployment.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

DLchain: A Covert Channel over Blockchain Based on Dynamic Labels.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

An Analysis of Anomalous User Agent Strings in Network Traffic.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

A Multi-View Deep Learning Model for Encrypted Website Service Classification.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

TLS/SSL Encrypted Traffic Classification with Autoencoder and Convolutional Neural Network.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

2017
Discovering abnormal behaviors via HTTP header fields measurement.
Concurr. Comput. Pract. Exp., 2017

Identifying Gambling and Porn Websites with Image Recognition.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Image-Set Based Collaborative Representation for Face Recognition in Videos.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Video face recognition through multi-scale and optimization of margin distributions.
Proceedings of the International Conference on Computational Science, 2017

2015
Detect the reflection amplification attack based on UDP protocol.
Proceedings of the 10th International Conference on Communications and Networking in China, 2015

2014
Active Calibration.
Computer Vision, A Reference Guide, 2014

Video face recognition via combination of real-time local features and temporal-spatial cues.
IET Comput. Vis., 2014

2012
A parallel matrix factorization based recommender by alternating stochastic gradient decent.
Eng. Appl. Artif. Intell., 2012

A Hybrid Local Feature for Face Recognition.
Proceedings of the PRICAI 2012: Trends in Artificial Intelligence, 2012

A Novel Video Face Clustering Algorithm Based on Divide and Conquer Strategy.
Proceedings of the PRICAI 2012: Trends in Artificial Intelligence, 2012

2011
Temporal-spatial face recognition using multi-atlas and Markov process model.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011


  Loading...