Xiaoyan Hu

Orcid: 0000-0002-4172-1977

According to our database1, Xiaoyan Hu authored at least 88 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
The secret behind instant messaging: video identification attack against complex protocols.
Cybersecur., December, 2025

A Detection Scheme for Multiplexed Asymmetric Workload DDoS Attacks in High-Speed Networks.
IEEE Trans. Netw. Serv. Manag., August, 2025

IEA-DMS: An Interpretable feature-driven, Efficient and Accurate Detection Method for Slow HTTP DoS in high-speed networks.
Comput. Secur., 2025

BTG-RF: Recognizing Douyin payment behaviors based on behavioral traffic graph analysis.
Comput. Networks, 2025

Accurate and Early Detection of Iot Malware Via Dns Traffic Analysis with Deep Learning.
Proceedings of the IEEE International Conference on Communications, 2025

Encrypted Yet Leaking: Analyzing Side-Channel Vulnerabilities in Location Privacy of LBS.
Proceedings of the IEEE International Conference on Communications, 2025

2024
RT-CBCH: Real-Time VPN Traffic Service Identification Based on Sampled Data in High-Speed Networks.
IEEE Trans. Netw. Serv. Manag., February, 2024

Multi-class Bitcoin mixing service identification based on graph classification.
Digit. Commun. Networks, 2024

SD-MDN-TM: A traceback and mitigation integrated mechanism against DDoS attacks with IP spoofing.
Comput. Networks, 2024

AHDom: Algorithmically generated domain detection using attribute heterogeneous graph neural network.
Comput. Networks, 2024

Identifying Video Resolution from Encrypted QUIC Streams in Segment-combined Transmission Scenarios.
Proceedings of the 34th edition of the Workshop on Network and Operating System Support for Digital Audio and Video, 2024

Efficient Short Video Identification Attack for Scenarios with Hybrid Transmission Modes and Preloading Mechanism.
Proceedings of the 20th International Conference on Mobility, Sensing and Networking, 2024

Enhancing Unknown Encrypted Traffic Clustering with Self-Supervised Learning.
Proceedings of the 2024 IEEE Global Communications Conference, 2024

Unveiling the Unseen: Video Recognition Attacks on Social Software.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
AF-FDS: An Accurate, Fast, and Fine-Grained Detection Scheme for DDoS Attacks in High-Speed Networks With Asymmetric Routing.
IEEE Trans. Netw. Serv. Manag., December, 2023

Fine-grained Ethereum behavior identification via encrypted traffic analysis with serialized backward inference.
Comput. Networks, December, 2023

Towards verifiable and privacy-preserving account model on a consortium blockchain based on zk-SNARKs.
Peer Peer Netw. Appl., August, 2023

PD-CPS: A practical scheme for detecting covert port scans in high-speed networks.
Comput. Networks, July, 2023

LossDetection: Real-Time Packet Loss Monitoring System for Sampled Traffic Data.
IEEE Trans. Netw. Serv. Manag., March, 2023

A Deep Subdomain Adaptation Network With Attention Mechanism for Malware Variant Traffic Identification at an IoT Edge Gateway.
IEEE Internet Things J., March, 2023

Resolution Identification of Encrypted Video Streaming Based on HTTP/2 Features.
ACM Trans. Multim. Comput. Commun. Appl., 2023

Toward Early and Accurate Network Intrusion Detection Using Graph Embedding.
IEEE Trans. Inf. Forensics Secur., 2023

ReplaceDGA: BiLSTM-Based Adversarial DGA With High Anti-Detection Ability.
IEEE Trans. Inf. Forensics Secur., 2023

Batch classifier with adaptive update for backbone traffic classification.
Comput. Commun., 2023

A Stable Fine-Grained Webpage Fingerprinting: Aiming at the Unstable Realistic Network.
Proceedings of the Security and Privacy in Communication Networks, 2023

Real-Time Platform Identification of VPN Video Streaming Based on Side-Channel Attack.
Proceedings of the ICT Systems Security and Privacy Protection, 2023

An Accurate and Real-Time Detection Method for Concealed Slow HTTP DoS in Backbone Network.
Proceedings of the ICT Systems Security and Privacy Protection, 2023

Real-Time Phishing Detection Based on URL Multi-Perspective Features: Aiming at the Real Web Environment.
Proceedings of the IEEE International Conference on Communications, 2023

A Novel Darknet Traffic Classification Method Based on Knowledge Graph with Dynamic Embedding Learning.
Proceedings of the IEEE International Conference on Communications, 2023

Detecting Cryptomining Traffic Over an Encrypted Proxy Based on K-S Test.
Proceedings of the IEEE International Conference on Communications, 2023

NFlowGAN: High-Utility Privacy-Preserving Network Flow Synthesis Based on GAN.
Proceedings of the IEEE International Conference on Communications, 2023

Website Fingerprinting with Packet Sampling: A More Realistic Approach in Real-World Networks.
Proceedings of the IEEE Global Communications Conference, 2023

Towards Early and Accurate IoT Device-Type Identification with Global Attention Mechanism.
Proceedings of the IEEE Global Communications Conference, 2023

Accurate Identification of Encrypted Videos in Asymmetric Routing Scenarios.
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023

2022
Identifying Ethereum traffic based on an active node library and DEVp2p features.
Future Gener. Comput. Syst., 2022

Efficient sharing of privacy-preserving sensing data on consortium blockchain via group key agreement.
Comput. Commun., 2022

Verifying Privacy-Preserving Financing Orders on a Consortium Blockchain Based on zk-SNARKs.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Service-Based Identification of Highly Coupled Mobile Applications.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

Identify IoT Devices from Backbone Networks Using Lightweight Neural Networks.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

PSCM: Towards Practical Encrypted Unknown Protocol Classification.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Real-time Application Identification of RTC Media Streams via Encrypted Traffic Analysis.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

Towards Accurate DGA Detection based on Siamese Network with Insufficient Training Samples.
Proceedings of the IEEE International Conference on Communications, 2022

IM-Shield: A Novel Defense System against DDoS Attacks under IP Spoofing in High-speed Networks.
Proceedings of the IEEE International Conference on Communications, 2022

Real-time Identification of VPN Traffic based on Counting Bloom Filter and Chained Hash Table from Sampled Data in High-speed Networks.
Proceedings of the IEEE International Conference on Communications, 2022

Detecting Slow Port Scans of Long Duration in High-Speed Networks.
Proceedings of the IEEE Global Communications Conference, 2022

A Dynamic Access Control Model Based on Attributes and Intro VAE.
Proceedings of the IEEE Global Communications Conference, 2022

An Adversarial Learning-based Tor Malware Traffic Detection Model.
Proceedings of the IEEE Global Communications Conference, 2022

HDS: A Hierarchical Scheme for Accurate and Efficient DDoS Flooding Attack Detection.
Proceedings of the 23rd Asia-Pacific Network Operations and Management Symposium, 2022

Service classification of high-speed network traffic based on Two-Stage Clustering.
Proceedings of the 23rd Asia-Pacific Network Operations and Management Symposium, 2022

2021
SFIM: Identify user behavior based on stable features.
Peer-to-Peer Netw. Appl., 2021

Exploring real-time super-resolution generative adversarial networks.
Int. J. Sens. Networks, 2021

Towards Efficient Co-audit of Privacy-Preserving Data on Consortium Blockchain via Group Key Agreement.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

BCAC: Batch Classifier based on Agglomerative Clustering for traffic classification in a backbone network.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Real-time Packet Loss Detection for TCP and UDP Based on Feature-Sketch.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Monitoring Video Resolution of Adaptive Encrypted Video Traffic Based on HTTP/2 Features.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Mobile Application Encryption Traffic Classification Based On TLS Flow Sequence Network.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Accurate and Fast Detection of DDoS Attacks in High-Speed Network with Asymmetric Routing.
Proceedings of the IEEE Global Communications Conference, 2021

Detecting Cryptojacking Traffic Based on Network Behavior Features.
Proceedings of the IEEE Global Communications Conference, 2021

2020
A network-wide view-based detection and mitigation of a sophisticated Interest Flooding Attack.
EURASIP J. Wirel. Commun. Netw., 2020

An on-demand off-path cache exploration based multipath forwarding strategy.
Comput. Networks, 2020

COMPASS: Directing Named Data Transmission in VANETs by Dynamic Directional Interfaces.
IEEE Access, 2020

A Demand and Responsiveness-based Caching Strategy for Network Coding Enabled NDN.
Proceedings of the IEEE Global Communications Conference, 2020

Towards Network Coding and Request Pipelining Enabled NDN for Big Data Transmission.
Proceedings of the IEEE Global Communications Conference, 2020

2019
GPU based Real-time Super Hosts Detection at Distributed Edge Routers.
CoRR, 2019

<i>VATE</i>: A trade-off between memory and preserving time for high accurate cardinality estimation under sliding time window.
Comput. Commun., 2019

An Adaptive Profile-Based Approach for Detecting Anomalous Traffic in Backbone.
IEEE Access, 2019

A Super Point Detection Algorithm Under Sliding Time Windows Based on Rough and Linear Estimators.
IEEE Access, 2019

Exploration and Exploitation of Off-path Cached Content in Network Coding Enabled Named Data Networking.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Detecting and Mitigating A Sophisticated Interest Flooding Attack in NDN from the Network-Wide View.
Proceedings of the First IEEE International Workshop on Network Meets Intelligent Computations, 2019

Inferring ADU Combinations from Encrypted QUIC Stream.
Proceedings of the 14th International Conference on Future Internet Technologies, 2019

Enabling Linearly Homomorphic Signatures in Network Coding-based Named Data Networking.
Proceedings of the 14th International Conference on Future Internet Technologies, 2019

RTSRGAN: Real-Time Super-Resolution Generative Adversarial Networks.
Proceedings of the Seventh International Conference on Advanced Cloud and Big Data, 2019

2018
VATE: a trade-off between memory and preserving time for high accuracy cardinalities estimation under sliding time window.
CoRR, 2018

SRLA: A real time sliding time window super point cardinality estimation algorithm for high speed network based on GPU.
CoRR, 2018

Mitigating Content Poisoning With Name-Key Based Forwarding and Multipath Forwarding Based Inband Probe for Energy Management in Smart Cities.
IEEE Access, 2018

Abnormal Hosts Monitor for City Wide Core Network by Real Time Super Points Cardinality Estimation.
Proceedings of the 2018 IEEE SmartWorld, 2018

Most Memory Efficient Distributed Super Points Detection on Core Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

SRLA: A Real Time Sliding Time Window Super Point Cardinality Estimation Algorithm for High Speed Network Based on GPU.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

2017
High Speed Network Super Points Detection Based on Sliding Time Window by GPU.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

2016
Social relationship discovery of IP addresses in the managed IP networks by observing traffic at network boundary.
Comput. Networks, 2016

Enabling Fast Recovery from Unanticipated Data Access Failure in Named Data Networking.
Proceedings of the 11th International Conference on Future Internet Technologies, 2016

2015
RTT Estimation with Sampled Flow Data.
IEICE Trans. Commun., 2015

Enhancing in-network caching by coupling cache placement, replacement and location.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Opportunistic On-Path Caching for Named Data Networking.
IEICE Trans. Commun., 2014

CANR: Cache-Aware Name-based Routing.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

2013
PhD forum: Not so cooperative caching.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Not So Cooperative Caching in Named Data Networking.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Distributed in-network cooperative caching.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012


  Loading...