AdvTG: An Adversarial Traffic Generation Framework to Deceive DL-Based Malicious Traffic Detection Models.
Proceedings of the ACM on Web Conference 2025, 2025
HOLMES & WATSON: A Robust and Lightweight HTTPS Website Fingerprinting through HTTP Version Parallelism.
Proceedings of the ACM on Web Conference 2025, 2025
FlowMiner: A Powerful Model Based on Flow Correlation Mining for Encrypted Traffic Classification.
Proceedings of the IEEE INFOCOM 2025, 2025
APTSniffer: Detecting APT Attack Traffic Using Retrieval-Augmented Large Language Models.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025
A Targeted Adversarial Attack Method for Multi-Classification Malicious Traffic Detection.
Proceedings of the IEEE International Conference on Acoustics, 2024
ProxyKiller: An Anonymous Proxy Traffic Attack Model Based on Traffic Behavior Graphs.
Proceedings of the Computer Security - ESORICS 2024, 2024
GPMT: Generating practical malicious traffic based on adversarial attacks with little prior knowledge.
Comput. Secur., 2023
Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features.
Comput. Secur., 2022
Analysis and Detection against Network Attacks in the Overlapping Phenomenon of Behavior Attribute.
Comput. Secur., 2022
RAAM: A Restricted Adversarial Attack Model with Adding Perturbations to Traffic Features.
Proceedings of the ICT Systems Security and Privacy Protection, 2022
Analysis and Detection Against Overlapping Phenomenon of Behavioral Attribute in Network Attacks.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
TrafficGCN: Mobile Application Encrypted Traffic Classification Based on GCN.
Proceedings of the IEEE Global Communications Conference, 2022
VT-GAT: A Novel VPN Encrypted Traffic Classification Model Based on Graph Attention Neural Network.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022