Zhenyu Cheng

Orcid: 0000-0003-3292-7428

Affiliations:
  • University of Chinese Academy of Sciences, Beijing, China


According to our database1, Zhenyu Cheng authored at least 18 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
AntCom: An effective and efficient anti-tracking system with dynamic and asymmetric communication channel.
J. Netw. Comput. Appl., September, 2023

GPMT: Generating practical malicious traffic based on adversarial attacks with little prior knowledge.
Comput. Secur., 2023

MTCD-Model: A Two-Layer Model for Malicious Traffic Classification and Detection Based on Hierarchical Feature Learning.
Proceedings of the International Joint Conference on Neural Networks, 2023

TCCN: A Network Traffic Classification and Detection Model Based on Capsule Network.
Proceedings of the IEEE International Conference on Communications, 2023

2022
RAAM: A Restricted Adversarial Attack Model with Adding Perturbations to Traffic Features.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

Effective Malicious URL Detection by Using Generative Adversarial Networks.
Proceedings of the Web Engineering - 22nd International Conference, 2022

HNOP: Attack Traffic Detection Based on Hierarchical Node Hopping Features of Packets.
Proceedings of the Computational Science - ICCS 2022, 2022

DITA-NCG: Detecting Information Theft Attack Based on Node Communication Graph.
Proceedings of the Computational Science - ICCS 2022, 2022

TrafficGCN: Mobile Application Encrypted Traffic Classification Based on GCN.
Proceedings of the IEEE Global Communications Conference, 2022

VT-GAT: A Novel VPN Encrypted Traffic Classification Model Based on Graph Attention Neural Network.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022

2021
LIFH: Learning Interactive Features from HTTP Payload using Image Reconstruction.
Proceedings of the ICC 2021, 2021

2020
Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

2019
MURITE-Detector: Identifying User-Role in Information Theft Events of Mobile Network.
Proceedings of the 18th IEEE International Conference On Trust, 2019

2018
Community Discovery of Attribution Trace Based on Deep Learning Approach.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

MUI-defender: CNN-Driven, Network Flow-Based Information Theft Detection for Mobile Users.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

Important Member Discovery of Attribution Trace Based on Relevant Circle (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

2017
NetworkTrace: Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Detecting Information Theft Based on Mobile Network Flows for Android Users.
Proceedings of the 2017 International Conference on Networking, Architecture, and Storage, 2017


  Loading...