Jiangtao Zhai

Orcid: 0000-0001-8557-9899

According to our database1, Jiangtao Zhai authored at least 33 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
A semantic element representation model for malicious domain name detection.
J. Inf. Secur. Appl., 2022

2021
Detecting Multielement Algorithmically Generated Domain Names Based on Adaptive Embedding Model.
Secur. Commun. Networks, 2021

Fast3DS: A real-time full-convolutional malicious domain name detection system.
J. Inf. Secur. Appl., 2021

Design a Wireless Covert Channel Based on Dither Analog Chaotic Code.
Int. J. Digit. Crime Forensics, 2021

VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning.
IEEE Access, 2021

2020
An Encrypted Traffic Identification Scheme Based on the Multilevel Structure and Variational Automatic Encoder.
Secur. Commun. Networks, 2020

Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework.
IEEE Access, 2020

Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid.
IEEE Access, 2020

2019
Detecting Word-Based Algorithmically Generated Domains Using Semantic Analysis.
Symmetry, 2019

An end-to-end generative network for environmental sound-based covert communication.
Multim. Tools Appl., 2019

Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices.
KSII Trans. Internet Inf. Syst., 2019

Quaternion Convolutional Neural Network for Color Image Classification and Forensics.
IEEE Access, 2019

Detection of Triple JPEG Compressed Color Images.
IEEE Access, 2019

2018
Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking.
Secur. Commun. Networks, 2018

A Wireless Covert Channel Based on Constellation Shaping Modulation.
Secur. Commun. Networks, 2018

Sound Texture Generative Model Guided by a Lossless Mel-Frequency Convolutional Neural Network.
IEEE Access, 2018

A Novel Detection Method for Word-Based DGA.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Comprehensive Analysis of Interval Based Network Flow Watermarking.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

An Improved ICS Honeypot Based on SNAP7 and IMUNES.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Detection of Jitterbug Covert Channel Based on Partial Entropy Test.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Designing Analog Fountain Timing Channels: Undetectability, Robustness, and Model-Adaptation.
IEEE Trans. Inf. Forensics Secur., 2016

Detecting <i>JitterBug</i> covert timing channel with sparse embedding.
Secur. Commun. Networks, 2016

Novel Covert Timing Channels Implemented over Multiple Flows by Using Space-Time Trellis Codes.
J. Inf. Hiding Multim. Signal Process., 2016

A Covert Timing Channel Based on DCT Domain of Inter Packet Delay Sequence.
J. Inf. Hiding Multim. Signal Process., 2016

Detection and Parameter Estimation for Jitterbug Covert Channel Based on Coefficient of Variation.
KSII Trans. Internet Inf. Syst., 2016

A Construction Scheme of Steganographic Codes Based on Matrix Unwrapping.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Improving Reliability of Covert Timing Channel to Packet Loss.
J. Inf. Hiding Multim. Signal Process., 2015

SkyLen: a Skype-based length covert channel.
J. Inf. Hiding Multim. Signal Process., 2015

SkyLen: a Simple covert timing channel based on Huffman encoding.
J. Inf. Hiding Multim. Signal Process., 2015

2013
Detection of TCP covert channel based on Markov model.
Telecommun. Syst., 2013

An Improved Retransmission-based Network Steganography: Design and Detection.
J. Networks, 2013

2012
Network covert timing channel with distribution matching.
Telecommun. Syst., 2012

2003
Wavelet Lossy and Lossless Compression Techniques for Image.
Proceedings of the Wavelet Analysis and Its Applications, 2003


  Loading...