Mingxin Cui

According to our database1, Mingxin Cui authored at least 25 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Zero-relabelling mobile-app identification over drifted encrypted network traffic.
Comput. Networks, June, 2023

FA-Net: More Accurate Encrypted Network Traffic Classification Based on Burst with Self-Attention.
Proceedings of the International Joint Conference on Neural Networks, 2023

Analysing Covertness of Tor Bridge Request.
Proceedings of the IEEE International Conference on Communications, 2023

Covertness Analysis of Snowflake Proxy Request.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
Empirical Study on the Influencing Factors of WeChat Business Integrity.
J. Glob. Inf. Manag., 2022

Accurate mobile-app fingerprinting using flow-level relationship with graph neural networks.
Comput. Networks, 2022

Global-Aware Prototypical Network for Few-Shot Encrypted Traffic Classification.
Proceedings of the IFIP Networking Conference, 2022

MuKEA: Multimodal Knowledge Extraction and Accumulation for Knowledge-based Visual Question Answering.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

WSNet: A Wrapper-Based Stacking Network for Multi-scenes Classification of DApps.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

2021
Survey of security supervision on blockchain from the perspective of technology.
J. Inf. Secur. Appl., 2021

SiamHAN: IPv6 Address Correlation Attacks on TLS Encrypted Traffic via Siamese Heterogeneous Graph Attention Network.
Proceedings of the 30th USENIX Security Symposium, 2021

Attack versus Attack: Toward Adversarial Example Defend Website Fingerprinting Attack.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Universal Website Fingerprinting Defense Based on Adversarial Examples.
Proceedings of the 20th IEEE International Conference on Trust, 2021

TMT-RF: Tunnel Mixed Traffic Classification Based on Random Forest.
Proceedings of the Security and Privacy in Communication Networks, 2021

CQNet: A Clustering-Based Quadruplet Network for Decentralized Application Classification via Encrypted Traffic.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2021

Combating Imbalance in Network Traffic Classification Using GAN Based Oversampling.
Proceedings of the IFIP Networking Conference, 2021

TA-GAN: GAN based Traffic Augmentation for Imbalanced Network Traffic Classification.
Proceedings of the International Joint Conference on Neural Networks, 2021

Illuminate the Shadow: A Comprehensive Study of TLS Client Certificate Ecosystem in the Wild.
Proceedings of the 28th International Conference on Telecommunications, 2021

TunnelScanner: A Novel Approach For Tunnel Mixed Traffic Classification Using Machine Learning.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

BAPM: Block Attention Profiling Model for Multi-tab Website Fingerprinting Attacks on Tor.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
TransNet: Unseen Malware Variants Detection Using Deep Transfer Learning.
Proceedings of the Security and Privacy in Communication Networks, 2020

MalFinder: An Ensemble Learning-based Framework For Malicious Traffic Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Mining the Characteristics of the Ethereum P2P Network.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

2018
How Is the Forged Certificates in the Wild: Practice on Large-Scale SSL Usage Measurement and Analysis.
Proceedings of the Computational Science - ICCS 2018, 2018

2017
POSTER: A Comprehensive Study of Forged Certificates in the Wild.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017


  Loading...