Jiaping Gui
Orcid: 0009-0001-4272-9604
According to our database1,
Jiaping Gui
authored at least 30 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Are We There Yet? Unraveling the State-of-the-Art Graph Network Intrusion Detection Systems.
CoRR, March, 2025
CoRR, March, 2025
Solving Data Contamination in DDoS Detection: A Method Based on Hierarchical Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2025
IEEE Trans. Dependable Secur. Comput., 2025
DISTR: Detecting multi-stage IoT botnets through contextual traffic and causal analytics.
Comput. Secur., 2025
BackdoorMBTI: A Backdoor Learning Multimodal Benchmark Tool Kit for Backdoor Defense Evaluation.
Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining, V.1, 2025
A Principled Approach for Detecting APTs in Massive Networks via Multi-Stage Causal Analytics.
Proceedings of the IEEE INFOCOM 2025, 2025
2024
BackdoorMBTI: A Backdoor Learning Multimodal Benchmark Tool Kit for Backdoor Defense Evaluation.
CoRR, 2024
An Experimental Study of Different Aggregation Schemes in Semi-Asynchronous Federated Learning.
CoRR, 2024
FAMOS: Robust Privacy-Preserving Authentication on Payment Apps via Federated Multi-Modal Contrastive Learning.
Proceedings of the 33rd USENIX Security Symposium, 2024
HFL-AD: A Hierarchical Federated Learning Framework for Solving Data Contamination in DDoS Detection.
Proceedings of the 23rd IEEE International Conference on Trust, 2024
Proceedings of the Applied Cryptography and Network Security, 2024
2021
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021
2020
A Generic Edge-Empowered Graph Convolutional Network via Node-Edge Mutual Enhancement.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2017
Softw. Test. Verification Reliab., 2017
What Aspects of Mobile Ads Do Users Care About? An Empirical Study of Mobile In-app Ad Reviews.
CoRR, 2017
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017
2016
Proceedings of the 38th International Conference on Software Engineering, 2016
Proceedings of the 5th International Workshop on Green and Sustainable Software, 2016
2015
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
2014
Proceedings of the 30th IEEE International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, September 29, 2014
2012
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
Proceedings of the 23rd IEEE International Symposium on Personal, 2012
2011
Proceedings of the Applied Informatics and Communication - International Conference, 2011