Yepeng Yao

Orcid: 0000-0002-2669-4915

According to our database1, Yepeng Yao authored at least 20 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Bi-LSTM approach for modelling movement uncertainty of crowdsourced human trajectories under complex urban environments.
Int. J. Appl. Earth Obs. Geoinformation, August, 2023

M3F: A novel multi-session and multi-protocol based malware traffic fingerprinting.
Comput. Networks, May, 2023

Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning.
Proceedings of the 32nd USENIX Security Symposium, 2023

Self-paced and Reweighting PU Learning for Imbalanced Malicious Traffic Detection.
Proceedings of the IEEE Global Communications Conference, 2023

Who Are Querying For Me? Egress Measurement For Open DNS Resolvers.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
Measurement for encrypted open resolvers: Applications and security.
Comput. Networks, 2022

Effectiveness Evaluation of Evasion Attack on Encrypted Malicious Traffic Detection.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Analysis of the performance and robustness of methods to detect base locations of individuals with geo-tagged social media data.
Int. J. Geogr. Inf. Sci., 2021

Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Trojan Traffic Detection Based on Meta-learning.
Proceedings of the Computational Science - ICCS 2021, 2021

Producing More with Less: A GAN-based Network Attack Detection Approach for Imbalanced Data.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

2020
Towards Comprehensive Detection of DNS Tunnels.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Towards Network Anomaly Detection Using Graph Embedding.
Proceedings of the Computational Science - ICCS 2020, 2020

2019
STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-Based Network Attack Detection.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Marrying Graph Kernel with Deep Neural Network: A Case Study for Network Anomaly Detection.
Proceedings of the Computational Science - ICCS 2019, 2019

2018
Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection.
Proceedings of the 17th IEEE International Conference On Trust, 2018

DeepGFL: Deep Feature Learning via Graph for Attack Detection on Flow-Based Network Traffic.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

A Novel Approach for Identifying Lateral Movement Attacks Based on Network Embedding.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018


  Loading...