Tianning Zang

According to our database1, Tianning Zang authored at least 35 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Let model keep evolving: Incremental learning for encrypted traffic classification.
Comput. Secur., February, 2024

2023
Facing Unknown: Open-World Encrypted Traffic Classification Based on Contrastive Pre-Training.
CoRR, 2023

Real-Time Aggregation for Massive Alerts Based on Dynamic Attack Granularity Graph.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

Facing Unknown: Open-World Encrypted Traffic Classification Based on Contrastive Pre-Training.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

MTCD-Model: A Two-Layer Model for Malicious Traffic Classification and Detection Based on Hierarchical Feature Learning.
Proceedings of the International Joint Conference on Neural Networks, 2023

Explainable Text Classification via Attentive and Targeted Mixing Data Augmentation.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

TCCN: A Network Traffic Classification and Detection Model Based on Capsule Network.
Proceedings of the IEEE International Conference on Communications, 2023

2022
Hidden Path: Understanding the Intermediary in Malicious Redirections.
IEEE Trans. Inf. Forensics Secur., 2022

Feature Weaken: Vicinal Data Augmentation for Classification.
CoRR, 2022

Cost-Effective Malware Classification Based on Deep Active Learning.
Proceedings of the Security and Privacy in Communication Networks, 2022

Malicious Blockchain Domain Detection Based on Heterogeneous Information Network.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Finding disposable domain names: A linguistics-based stacking approach.
Comput. Networks, 2021

Winding Path: Characterizing the Malicious Redirection in Squatting Domain Names.
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021

Incremental Learning for Mobile Encrypted Traffic Classification.
Proceedings of the ICC 2021, 2021

Inspector: A Semantics-Driven Approach to Automatic Protocol Reverse Engineering.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

Mobile Encrypted Traffic Classification Based on Message Type Inference.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

2020
Khaos: An Adversarial Neural Network DGA With High Anti-Detection Ability.
IEEE Trans. Inf. Forensics Secur., 2020

MalPortrait: Sketch Malicious Domain Portraits Based on Passive DNS Data.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

Leopard: Understanding the Threat of Blockchain Domain Name Based Malware.
Proceedings of the Passive and Active Measurement - 21st International Conference, 2020

A Multi-feature-based Approach to Malicious Domain Name Identification from DNS Traffic.
Proceedings of the 27th International Conference on Telecommunications, 2020

2019
Themis: A Novel Detection Approach for Detecting Mixed Algorithmically Generated Domains.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019

A Linguistics-based Stacking Approach to Disposable Domains Detection.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

A Comprehensive Measurement Study of Domain-Squatting Abuse.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Pontus: A Linguistics-Based DGA Detection System.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Nemesis: Detecting Algorithmically Generated Domains with an LSTM Language Model.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019

2018
Information Propagation Prediction Based on Key Users Authentication in Microblogging.
Secur. Commun. Networks, 2018

Detecting Domain Generation Algorithms with Convolutional Neural Language Models.
Proceedings of the 17th IEEE International Conference On Trust, 2018

The Rapid Extraction of Suspicious Traffic from Passive DNS.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

A Stacking Approach to Objectionable-Related Domain Names Identification by Passive DNS Traffic (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

2017
Rethinking robust and accurate application protocol identification.
Comput. Networks, 2017

2014
Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-Coupled Payloads Filtering Scheme.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2011
Andbot: Towards Advanced Mobile Botnets.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

2010
Cooperative Work Systems for the Security of Digital Computing Infrastructure.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

2008
A Survey of Alert Fusion Techniques for Security Incident.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008


  Loading...