Hua Wu

Orcid: 0000-0002-8829-0182

Affiliations:
  • Southeast University, School of Cyber Science and Engineering, Nanjing, China


According to our database1, Hua Wu authored at least 49 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
RT-CBCH: Real-Time VPN Traffic Service Identification Based on Sampled Data in High-Speed Networks.
IEEE Trans. Netw. Serv. Manag., February, 2024

Identifying Video Resolution from Encrypted QUIC Streams in Segment-combined Transmission Scenarios.
Proceedings of the 34th edition of the Workshop on Network and Operating System Support for Digital Audio and Video, 2024

2023
AF-FDS: An Accurate, Fast, and Fine-Grained Detection Scheme for DDoS Attacks in High-Speed Networks With Asymmetric Routing.
IEEE Trans. Netw. Serv. Manag., December, 2023

Fine-grained Ethereum behavior identification via encrypted traffic analysis with serialized backward inference.
Comput. Networks, December, 2023

Towards verifiable and privacy-preserving account model on a consortium blockchain based on zk-SNARKs.
Peer Peer Netw. Appl., August, 2023

PD-CPS: A practical scheme for detecting covert port scans in high-speed networks.
Comput. Networks, July, 2023

LossDetection: Real-Time Packet Loss Monitoring System for Sampled Traffic Data.
IEEE Trans. Netw. Serv. Manag., March, 2023

A Deep Subdomain Adaptation Network With Attention Mechanism for Malware Variant Traffic Identification at an IoT Edge Gateway.
IEEE Internet Things J., March, 2023

Resolution Identification of Encrypted Video Streaming Based on HTTP/2 Features.
ACM Trans. Multim. Comput. Commun. Appl., 2023

Toward Early and Accurate Network Intrusion Detection Using Graph Embedding.
IEEE Trans. Inf. Forensics Secur., 2023

ReplaceDGA: BiLSTM-Based Adversarial DGA With High Anti-Detection Ability.
IEEE Trans. Inf. Forensics Secur., 2023

Batch classifier with adaptive update for backbone traffic classification.
Comput. Commun., 2023

Real-Time Platform Identification of VPN Video Streaming Based on Side-Channel Attack.
Proceedings of the ICT Systems Security and Privacy Protection, 2023

Real-Time Phishing Detection Based on URL Multi-Perspective Features: Aiming at the Real Web Environment.
Proceedings of the IEEE International Conference on Communications, 2023

A Novel Darknet Traffic Classification Method Based on Knowledge Graph with Dynamic Embedding Learning.
Proceedings of the IEEE International Conference on Communications, 2023

Detecting Cryptomining Traffic Over an Encrypted Proxy Based on K-S Test.
Proceedings of the IEEE International Conference on Communications, 2023

NFlowGAN: High-Utility Privacy-Preserving Network Flow Synthesis Based on GAN.
Proceedings of the IEEE International Conference on Communications, 2023

Website Fingerprinting with Packet Sampling: A More Realistic Approach in Real-World Networks.
Proceedings of the IEEE Global Communications Conference, 2023

Towards Early and Accurate IoT Device-Type Identification with Global Attention Mechanism.
Proceedings of the IEEE Global Communications Conference, 2023

Accurate Identification of Encrypted Videos in Asymmetric Routing Scenarios.
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023

2022
Identifying Ethereum traffic based on an active node library and DEVp2p features.
Future Gener. Comput. Syst., 2022

Efficient sharing of privacy-preserving sensing data on consortium blockchain via group key agreement.
Comput. Commun., 2022

Service-Based Identification of Highly Coupled Mobile Applications.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

Identify IoT Devices from Backbone Networks Using Lightweight Neural Networks.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

PSCM: Towards Practical Encrypted Unknown Protocol Classification.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Real-time Application Identification of RTC Media Streams via Encrypted Traffic Analysis.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

Towards Accurate DGA Detection based on Siamese Network with Insufficient Training Samples.
Proceedings of the IEEE International Conference on Communications, 2022

IM-Shield: A Novel Defense System against DDoS Attacks under IP Spoofing in High-speed Networks.
Proceedings of the IEEE International Conference on Communications, 2022

Real-time Identification of VPN Traffic based on Counting Bloom Filter and Chained Hash Table from Sampled Data in High-speed Networks.
Proceedings of the IEEE International Conference on Communications, 2022

Detecting Slow Port Scans of Long Duration in High-Speed Networks.
Proceedings of the IEEE Global Communications Conference, 2022

A Dynamic Access Control Model Based on Attributes and Intro VAE.
Proceedings of the IEEE Global Communications Conference, 2022

An Adversarial Learning-based Tor Malware Traffic Detection Model.
Proceedings of the IEEE Global Communications Conference, 2022

HDS: A Hierarchical Scheme for Accurate and Efficient DDoS Flooding Attack Detection.
Proceedings of the 23rd Asia-Pacific Network Operations and Management Symposium, 2022

Service classification of high-speed network traffic based on Two-Stage Clustering.
Proceedings of the 23rd Asia-Pacific Network Operations and Management Symposium, 2022

2021
SFIM: Identify user behavior based on stable features.
Peer-to-Peer Netw. Appl., 2021

BCAC: Batch Classifier based on Agglomerative Clustering for traffic classification in a backbone network.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Real-time Packet Loss Detection for TCP and UDP Based on Feature-Sketch.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Monitoring Video Resolution of Adaptive Encrypted Video Traffic Based on HTTP/2 Features.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Mobile Application Encryption Traffic Classification Based On TLS Flow Sequence Network.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Accurate and Fast Detection of DDoS Attacks in High-Speed Network with Asymmetric Routing.
Proceedings of the IEEE Global Communications Conference, 2021

2020
A network-wide view-based detection and mitigation of a sophisticated Interest Flooding Attack.
EURASIP J. Wirel. Commun. Netw., 2020

Identification of Encrypted Video Streaming Based on Differential Fingerprints.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Instagram User Behavior Identification Based on Multidimensional Features.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Effectiveness Evaluation Method for Cyber Deception Based on Dynamic Bayesian Attack Graph.
Proceedings of the CSSE 2020: 3rd International Conference on Computer Science and Software Engineering, 2020

2019
Detecting and Mitigating A Sophisticated Interest Flooding Attack in NDN from the Network-Wide View.
Proceedings of the First IEEE International Workshop on Network Meets Intelligent Computations, 2019

Inferring ADU Combinations from Encrypted QUIC Stream.
Proceedings of the 14th International Conference on Future Internet Technologies, 2019

2012
A NetFlow v9 Measurement System with Network Performance Function.
Proceedings of the Internet and Distributed Computing Systems, 2012

2009
Packet Loss Estimation of TCP Flows Based on the Delayed ACK Mechanism.
Proceedings of the Management Enabling the Future Internet for Changing Business and New Computing Services, 2009

2008
Adaptive sampling algorithm for detection of superpoints.
Sci. China Ser. F Inf. Sci., 2008


  Loading...