Zhigang Lu

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
  • University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China


According to our database1, Zhigang Lu authored at least 43 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Unveiling shadows: A comprehensive framework for insider threat detection based on statistical and sequential analysis.
Comput. Secur., March, 2024

Unveiling encrypted traffic types through hierarchical network characteristics.
Comput. Secur., March, 2024

2023
Aparecium: understanding and detecting scam behaviors on Ethereum via biased random walk.
Cybersecur., December, 2023

Network intrusion detection based on n-gram frequency and time-aware transformer.
Comput. Secur., May, 2023

CBSeq: A Channel-Level Behavior Sequence for Encrypted Malware Traffic Detection.
IEEE Trans. Inf. Forensics Secur., 2023

HANDOM: Heterogeneous Attention Network Model for Malicious Domain Detection.
Comput. Secur., 2023

C-BEDIM and S-BEDIM: Lateral movement detection in enterprise network through behavior deviation measurement.
Comput. Secur., 2023

A Fast Gradient Boosting Based Approach for Predicting Frags in Tactic Games.
Proceedings of the IEEE International Conference on Multimedia and Expo Workshops, 2023

Few-Shot Network Traffic Anomaly Detection Based on Siamese Neural Network.
Proceedings of the IEEE International Conference on Communications, 2023

HLMD: Detecting Lateral Movement Using Heterogeneous Graph Model.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

TAElog: A Novel Transformer AutoEncoder-Based Log Anomaly Detection Method.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Only Header: a reliable encrypted traffic classification framework without privacy risk.
Soft Comput., December, 2022

Blockchain abnormal behavior awareness methods: a survey.
Cybersecur., 2022

CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network.
Proceedings of the Security and Privacy in Communication Networks, 2022

IV-IDM: Reliable Intrusion Detection Method based on Involution and Voting.
Proceedings of the IEEE International Conference on Communications, 2022

An Approach for Predicting the Costs of Forwarding Contracts using Gradient Boosting.
Proceedings of the 17th Conference on Computer Science and Intelligence Systems, 2022

2021
MBTree: Detecting Encryption RATs Communication Using Malicious Behavior Tree.
IEEE Trans. Inf. Forensics Secur., 2021

Caps-LSTM: A Novel Hierarchical Encrypted VPN Network Traffic Identification Using CapsNet and LSTM.
Proceedings of the Science of Cyber Security - Third International Conference, 2021

BEDIM: Lateral Movement Detection In Enterprise Network Through Behavior Deviation Measurement.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

WP-GBDT: An Approach for Winner Prediction using Gradient Boosting Decision Tree.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
THS-IDPC: A three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection.
J. Supercomput., 2020

MBTree: Detecting Encryption RAT Communication Using Malicious Behavior Tree.
CoRR, 2020

CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification.
Comput. Networks, 2020

STIDM: A Spatial and Temporal Aware Intrusion Detection Model.
Proceedings of the 19th IEEE International Conference on Trust, 2020

MTLAT: A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER.
Proceedings of the Network and Parallel Computing, 2020

Malicious Domain Detection Based on K-means and SMOTE.
Proceedings of the Computational Science - ICCS 2020, 2020

Social Recommendation in Heterogeneous Evolving Relation Network.
Proceedings of the Computational Science - ICCS 2020, 2020

2019
STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-Based Network Attack Detection.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Retweet Prediction Using Context-Aware Coupled Matrix-Tensor Factorization.
Proceedings of the Knowledge Science, Engineering and Management, 2019

PRTIRG: A Knowledge Graph for People-Readable Threat Intelligence Recommendation.
Proceedings of the Knowledge Science, Engineering and Management, 2019

isAnon: Flow-Based Anonymity Network Traffic Identification Using Extreme Gradient Boosting.
Proceedings of the International Joint Conference on Neural Networks, 2019

Marrying Graph Kernel with Deep Neural Network: A Case Study for Network Anomaly Detection.
Proceedings of the Computational Science - ICCS 2019, 2019

Mention Recommendation with Context-Aware Probabilistic Matrix Factorization.
Proceedings of the Computational Science - ICCS 2019, 2019

A Session-Packets-Based Encrypted Traffic Classification Using Capsule Neural Networks.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Retweeting Prediction Using Matrix Factorization with Binomial Distribution and Contextual Information.
Proceedings of the Database Systems for Advanced Applications, 2019

Identifying Truly Suspicious Events and False Alarms Based on Alert Graph.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
基于威胁情报平台的恶意URL检测研究 (Study on Malicious URL Detection Based on Threat Intelligence Platform).
计算机科学, 2018

Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection.
Proceedings of the 17th IEEE International Conference On Trust, 2018

DeepGFL: Deep Feature Learning via Graph for Attack Detection on Flow-Based Network Traffic.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

A Novel Approach for Identifying Lateral Movement Attacks Based on Network Embedding.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Retweet Prediction Using Social-Aware Probabilistic Matrix Factorization.
Proceedings of the Computational Science - ICCS 2018, 2018

2016
Event Detection with Convolutional Neural Networks for Forensic Investigation.
Proceedings of the Intelligent Information Processing VIII, 2016


  Loading...