Zhen Li

Orcid: 0000-0002-3892-4909

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
  • University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China


According to our database1, Zhen Li authored at least 80 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Traffic spills the beans: A robust video identification attack against YouTube.
Comput. Secur., February, 2024

2023
Few-shot encrypted traffic classification via multi-task representation enhanced meta-learning.
Comput. Networks, June, 2023

Zero-relabelling mobile-app identification over drifted encrypted network traffic.
Comput. Networks, June, 2023

FlowTracker: Improved flow correlation attacks with denoising and contrastive learning.
Comput. Secur., 2023

FA-Net: More Accurate Encrypted Network Traffic Classification Based on Burst with Self-Attention.
Proceedings of the International Joint Conference on Neural Networks, 2023

FedMP: Robust and Communication-Efficient Federated Multi-Prototype Intrusion Detection Framework in IoT.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Analysing Covertness of Tor Bridge Request.
Proceedings of the IEEE International Conference on Communications, 2023

Multi-Feature Fusion Based Approach for Classifying Encrypted Mobile Application Traffic.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Covertness Analysis of Snowflake Proxy Request.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Identifying DoH Tunnel Traffic Using Core Feathers and Machine Learning Method.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

PTC: Prompt-based Continual Encrypted Traffic Classification.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

TGC: Transaction Graph Contrast Network for Ethereum Phishing Scam Detection.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Privacy protection of China's top websites: A Multi-layer privacy measurement via network behaviours and privacy policies.
Comput. Secur., 2022

Accurate mobile-app fingerprinting using flow-level relationship with graph neural networks.
Comput. Networks, 2022

ET-BERT: A Contextualized Datagram Representation with Pre-training Transformers for Encrypted Traffic Classification.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

BSBA: Burst Series Based Approach for Identifying Fake Free-traffic.
Proceedings of the 23rd IEEE International Symposium on a World of Wireless, 2022

A Two-Stage Method for Fine-Grained DNS Covert Tunnel Behavior Detection.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

Anomaly Detection in Encrypted Identity Resolution Traffic based on Machine Learning.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Global-Aware Prototypical Network for Few-Shot Encrypted Traffic Classification.
Proceedings of the IFIP Networking Conference, 2022

Research on Novel TLS Protocol Network Traffic Management and Monitoring Method.
Proceedings of the 7th International Conference on Cyber Security and Information Engineering, 2022

MTBD: HTTPS Tunnel Detection Based on Multi-dimension Traffic Behaviors Decision.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

METC-MVAE: Mobile Encrypted Traffic Classification With Masked Variational Autoencoders.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

WSNet: A Wrapper-Based Stacking Network for Multi-scenes Classification of DApps.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
Classifying encrypted traffic using adaptive fingerprints with multi-level attributes.
World Wide Web, 2021

Survey of security supervision on blockchain from the perspective of technology.
J. Inf. Secur. Appl., 2021

SiamHAN: IPv6 Address Correlation Attacks on TLS Encrypted Traffic via Siamese Heterogeneous Graph Attention Network.
Proceedings of the 30th USENIX Security Symposium, 2021

Old Habits Die Hard: A Sober Look at TLS Client Certificates in the Real World.
Proceedings of the 20th IEEE International Conference on Trust, 2021

LFETT2021: A Large-scale Fine-grained Encrypted Tunnel Traffic Dataset.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Towards Multi-source Extension: A Multi-classification Method Based on Sampled NetFlow Records.
Proceedings of the 20th IEEE International Conference on Trust, 2021

CQNet: A Clustering-Based Quadruplet Network for Decentralized Application Classification via Encrypted Traffic.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2021

Combating Imbalance in Network Traffic Classification Using GAN Based Oversampling.
Proceedings of the IFIP Networking Conference, 2021

RecGraph: Graph Recovery Attack using Variational Graph Autoencoders.
Proceedings of the IEEE International Performance, 2021

6GAN: IPv6 Multi-Pattern Target Generation via Generative Adversarial Nets with Reinforcement Learning.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

UMVD-FSL: Unseen Malware Variants Detection Using Few-Shot Learning.
Proceedings of the International Joint Conference on Neural Networks, 2021

TA-GAN: GAN based Traffic Augmentation for Imbalanced Network Traffic Classification.
Proceedings of the International Joint Conference on Neural Networks, 2021

Illuminate the Shadow: A Comprehensive Study of TLS Client Certificate Ecosystem in the Wild.
Proceedings of the 28th International Conference on Telecommunications, 2021

After Everything is Connected: A Client Certificate-Oriented Perspective of IoT Device Security Analysis.
Proceedings of the ICIT 2021: IoT and Smart City, Guangzhou, China, December 22 - 25, 2021, 2021

Accelerating Robot Reinforcement Learning with Samples of Different Simulation Precision.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

TunnelScanner: A Novel Approach For Tunnel Mixed Traffic Classification Using Machine Learning.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

GMAF: A Novel Gradient-Based Model with ArcFace for Network Traffic Classification.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Large-Scale Measurement of Encrypted TLS Server Name Indication (ESNI): How Far Have We Come?
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

MEMG: Mobile Encrypted Traffic Classification With Markov Chains and Graph Neural Network.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

EthSniffer: A Global Passive Perspective on Ethereum.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

Multi-scene Classification of Blockchain Encrypted Traffic.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

BAPM: Block Attention Profiling Model for Multi-tab Website Fingerprinting Attacks on Tor.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
A Survey of Key Technologies for Constructing Network Covert Channel.
Secur. Commun. Networks, 2020

NSA-Net: A NetFlow Sequence Attention Network for Virtual Private Network Traffic Detection.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

Identifying DApps and User Behaviors on Ethereum via Encrypted Traffic.
Proceedings of the Security and Privacy in Communication Networks, 2020

TransNet: Unseen Malware Variants Detection Using Deep Transfer Learning.
Proceedings of the Security and Privacy in Communication Networks, 2020

MalFinder: An Ensemble Learning-based Framework For Malicious Traffic Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

ResTor: A Pre-Processing Model for Removing the Noise Pattern in Flow Correlation.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Not Afraid of the Unseen: a Siamese Network based Scheme for Unknown Traffic Discovery.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

JumpEstimate: a Novel Black-box Countermeasure to Website Fingerprint Attack Based on Decision-boundary Confusion.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

FLAGB: Focal Loss based Adaptive Gradient Boosting for Imbalanced Traffic Classification.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Joint Analysis of Port and Protocol via Endpoint Measurement: An Empirical Study.
Proceedings of the 21st Asia-Pacific Network Operations and Management Symposium, 2020

2019
Bridging Terrestrial Water Storage Anomaly During GRACE/GRACE-FO Gap Using SSA Method: A Case Study in China.
Sensors, 2019

Malicious Domain Detection via Domain Relationship and Graph Models.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

FS-Net: A Flow Sequence Network For Encrypted Traffic Classification.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Vision Information and Laser Module Based UAV Target Tracking.
Proceedings of the IECON 2019, 2019

DLchain: A Covert Channel over Blockchain Based on Dynamic Labels.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Machine Learning Based CloudBot Detection Using Multi-Layer Traffic Statistics.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Deep Forest with LRRS Feature for Fine-grained Website Fingerprinting with Encrypted SSL/TLS.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

2018
LaFFT: Length-Aware FFT Based Fingerprinting for Encrypted Network Traffic Classification.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

SSL/TLS Security Exploration Through X.509 Certificate's Life Cycle Measurement.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

Old Habits Die Hard: Fingerprinting Websites on the Cloud.
Proceedings of the Computational Science - ICCS 2018, 2018

TLS/SSL Encrypted Traffic Classification with Autoencoder and Convolutional Neural Network.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

An Overview of Blockchain Security Analysis.
Proceedings of the Cyber Security - 15th International Annual Conference, 2018

2017
A network attack forensic platform against HTTP evasive behavior.
J. Supercomput., 2017

Real Time Network File Similarity Detection Based on Approximate Matching.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Identifying Gambling and Porn Websites with Image Recognition.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Image-Set Based Collaborative Representation for Face Recognition in Videos.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Metrie learning with statistical features for network traffic classification.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Identifying malware with HTTP content type inconsistency via header-payload comparison.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Video face recognition through multi-scale and optimization of margin distributions.
Proceedings of the International Conference on Computational Science, 2017

POSTER: An Empirical Measurement Study on Multi-tenant Deployment Issues of CDNs.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Learning Deep Semantic Embeddings for Cross-Modal Retrieval.
Proceedings of The 9th Asian Conference on Machine Learning, 2017

2014
POSTER: Mining Elephant Applications in Unknown Traffic by Service Clustering.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2012
Availability analysis of DNSSEC resolution and validation service.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

Traffic Measurement Based DNSSEC Analysis.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012


  Loading...