Gaopeng Gou

Orcid: 0000-0002-3533-4874

According to our database1, Gaopeng Gou authored at least 91 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MMCo: using multimodal deep learning to detect malicious traffic with noisy labels.
Frontiers Comput. Sci., February, 2024

Traffic spills the beans: A robust video identification attack against YouTube.
Comput. Secur., February, 2024

MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Few-shot encrypted traffic classification via multi-task representation enhanced meta-learning.
Comput. Networks, June, 2023

Zero-relabelling mobile-app identification over drifted encrypted network traffic.
Comput. Networks, June, 2023

BoAu: Malicious traffic detection with noise labels based on boundary augmentation.
Comput. Secur., 2023

FlowTracker: Improved flow correlation attacks with denoising and contrastive learning.
Comput. Secur., 2023

FA-Net: More Accurate Encrypted Network Traffic Classification Based on Burst with Self-Attention.
Proceedings of the International Joint Conference on Neural Networks, 2023

FedMP: Robust and Communication-Efficient Federated Multi-Prototype Intrusion Detection Framework in IoT.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Analysing Covertness of Tor Bridge Request.
Proceedings of the IEEE International Conference on Communications, 2023

A Recurrent Self-learning Labeler for Building Network Traffic Ground Truth.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Covertness Analysis of Snowflake Proxy Request.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Identifying DoH Tunnel Traffic Using Core Feathers and Machine Learning Method.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

PTC: Prompt-based Continual Encrypted Traffic Classification.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

TGC: Transaction Graph Contrast Network for Ethereum Phishing Scam Detection.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Privacy protection of China's top websites: A Multi-layer privacy measurement via network behaviours and privacy policies.
Comput. Secur., 2022

Accurate mobile-app fingerprinting using flow-level relationship with graph neural networks.
Comput. Networks, 2022

ET-BERT: A Contextualized Datagram Representation with Pre-training Transformers for Encrypted Traffic Classification.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

TTAGN: Temporal Transaction Aggregation Graph Network for Ethereum Phishing Scams Detection.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

BSBA: Burst Series Based Approach for Identifying Fake Free-traffic.
Proceedings of the 23rd IEEE International Symposium on a World of Wireless, 2022

MCFM: Discover Sensitive Behavior from Encrypted Traffic in Industrial Control System.
Proceedings of the IEEE International Conference on Trust, 2022

A Two-Stage Method for Fine-Grained DNS Covert Tunnel Behavior Detection.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

GALG: Linking Addresses in Tracking Ecosystem Using Graph Autoencoder with Link Generation.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

Global-Aware Prototypical Network for Few-Shot Encrypted Traffic Classification.
Proceedings of the IFIP Networking Conference, 2022

MTBD: HTTPS Tunnel Detection Based on Multi-dimension Traffic Behaviors Decision.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

METC-MVAE: Mobile Encrypted Traffic Classification With Masked Variational Autoencoders.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

WSNet: A Wrapper-Based Stacking Network for Multi-scenes Classification of DApps.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
Classifying encrypted traffic using adaptive fingerprints with multi-level attributes.
World Wide Web, 2021

Survey of security supervision on blockchain from the perspective of technology.
J. Inf. Secur. Appl., 2021

SiamHAN: IPv6 Address Correlation Attacks on TLS Encrypted Traffic via Siamese Heterogeneous Graph Attention Network.
Proceedings of the 30th USENIX Security Symposium, 2021

Old Habits Die Hard: A Sober Look at TLS Client Certificates in the Real World.
Proceedings of the 20th IEEE International Conference on Trust, 2021

LFETT2021: A Large-scale Fine-grained Encrypted Tunnel Traffic Dataset.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Towards Multi-source Extension: A Multi-classification Method Based on Sampled NetFlow Records.
Proceedings of the 20th IEEE International Conference on Trust, 2021

TMT-RF: Tunnel Mixed Traffic Classification Based on Random Forest.
Proceedings of the Security and Privacy in Communication Networks, 2021

Multi-granularity Mobile Encrypted Traffic Classification Based on Fusion Features.
Proceedings of the Science of Cyber Security - Third International Conference, 2021

CQNet: A Clustering-Based Quadruplet Network for Decentralized Application Classification via Encrypted Traffic.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2021

Combating Imbalance in Network Traffic Classification Using GAN Based Oversampling.
Proceedings of the IFIP Networking Conference, 2021

A Study on Security Analysis of the Unlinkability in Tor.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

RecGraph: Graph Recovery Attack using Variational Graph Autoencoders.
Proceedings of the IEEE International Performance, 2021

Universal Perturbation for Flow Correlation Attack on Tor.
Proceedings of the IEEE International Performance, 2021

6GAN: IPv6 Multi-Pattern Target Generation via Generative Adversarial Nets with Reinforcement Learning.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

UMVD-FSL: Unseen Malware Variants Detection Using Few-Shot Learning.
Proceedings of the International Joint Conference on Neural Networks, 2021

GAP-WF: Graph Attention Pooling Network for Fine-grained SSL/TLS Website Fingerprinting.
Proceedings of the International Joint Conference on Neural Networks, 2021

TA-GAN: GAN based Traffic Augmentation for Imbalanced Network Traffic Classification.
Proceedings of the International Joint Conference on Neural Networks, 2021

Let Imbalance Have Nowhere to Hide: Class-Sensitive Feature Extraction for Imbalanced Traffic Classification.
Proceedings of the International Joint Conference on Neural Networks, 2021

TunnelScanner: A Novel Approach For Tunnel Mixed Traffic Classification Using Machine Learning.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

GMAF: A Novel Gradient-Based Model with ArcFace for Network Traffic Classification.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Large-Scale Measurement of Encrypted TLS Server Name Indication (ESNI): How Far Have We Come?
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

MEMG: Mobile Encrypted Traffic Classification With Markov Chains and Graph Neural Network.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

EthSniffer: A Global Passive Perspective on Ethereum.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

BAPM: Block Attention Profiling Model for Multi-tab Website Fingerprinting Attacks on Tor.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
A Survey of Key Technologies for Constructing Network Covert Channel.
Secur. Commun. Networks, 2020

NSA-Net: A NetFlow Sequence Attention Network for Virtual Private Network Traffic Detection.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

Identifying DApps and User Behaviors on Ethereum via Encrypted Traffic.
Proceedings of the Security and Privacy in Communication Networks, 2020

TransNet: Unseen Malware Variants Detection Using Deep Transfer Learning.
Proceedings of the Security and Privacy in Communication Networks, 2020

6VecLM: Language Modeling in Vector Space for IPv6 Target Generation.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Applied Data Science Track, 2020

6GCVAE: Gated Convolutional Variational Autoencoder for IPv6 Target Generation.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

MalFinder: An Ensemble Learning-based Framework For Malicious Traffic Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

WF-GAN: Fighting Back Against Website Fingerprinting Attack Using Adversarial Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

ResTor: A Pre-Processing Model for Removing the Noise Pattern in Flow Correlation.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Not Afraid of the Unseen: a Siamese Network based Scheme for Unknown Traffic Discovery.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

JumpEstimate: a Novel Black-box Countermeasure to Website Fingerprint Attack Based on Decision-boundary Confusion.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

FLAGB: Focal Loss based Adaptive Gradient Boosting for Imbalanced Traffic Classification.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

An Quick Available-Bandwidth Measurement Method Based on Link Delay Growth Rate.
Proceedings of the ICCBN 2020: 8th International Conference on Communications and Broadband Networking, 2020

MTLH: Video QoE Monitoring for Encrypted Traffic via Multi-Task Learning with Hierarchy.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Towards Aggregated Features: A Novel Proxy Detection Method Using NetFlow Data.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

PST: a More Practical Adversarial Learning-based Defense Against Website Fingerprinting.
Proceedings of the IEEE Global Communications Conference, 2020

Mining the Characteristics of the Ethereum P2P Network.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

Joint Analysis of Port and Protocol via Endpoint Measurement: An Empirical Study.
Proceedings of the 21st Asia-Pacific Network Operations and Management Symposium, 2020

2019
An Empirical Analysis of Plugin-Based Tor Traffic over SSH Tunnel.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

I Know What You Are Doing With Remote Desktop.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Malicious Domain Detection via Domain Relationship and Graph Models.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Identify OS from encrypted traffic with TCP/IP stack fingerprinting.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

A Comprehensive Study of Accelerating IPv6 Deployment.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

DLchain: A Covert Channel over Blockchain Based on Dynamic Labels.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

An Analysis of Anomalous User Agent Strings in Network Traffic.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

A Multi-View Deep Learning Model for Encrypted Website Service Classification.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

TLS/SSL Encrypted Traffic Classification with Autoencoder and Convolutional Neural Network.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

2017
Discovering abnormal behaviors via HTTP header fields measurement.
Concurr. Comput. Pract. Exp., 2017

Identifying Gambling and Porn Websites with Image Recognition.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Image-Set Based Collaborative Representation for Face Recognition in Videos.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Video face recognition through multi-scale and optimization of margin distributions.
Proceedings of the International Conference on Computational Science, 2017

2015
Detect the reflection amplification attack based on UDP protocol.
Proceedings of the 10th International Conference on Communications and Networking in China, 2015

2014
Active Calibration.
Computer Vision, A Reference Guide, 2014

Video face recognition via combination of real-time local features and temporal-spatial cues.
IET Comput. Vis., 2014

2012
A parallel matrix factorization based recommender by alternating stochastic gradient decent.
Eng. Appl. Artif. Intell., 2012

A Hybrid Local Feature for Face Recognition.
Proceedings of the PRICAI 2012: Trends in Artificial Intelligence, 2012

A Novel Video Face Clustering Algorithm Based on Divide and Conquer Strategy.
Proceedings of the PRICAI 2012: Trends in Artificial Intelligence, 2012

2011
Temporal-spatial face recognition using multi-atlas and Markov process model.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011


  Loading...