2025
Text Classification Based on Label Data Augmentation and Graph Neural Network.
IEEE Trans. Ind. Informatics, May, 2025

LMTCSG: Multilabel Text Classification Combining Sequence-Based and GNN-Based Features.
IEEE Trans. Ind. Informatics, January, 2025

METC: A Hybrid Deep Learning Framework for Cross-Network Encrypted DNS over HTTPS Traffic Detection and Tunnel Identification.
Inf. Fusion, 2025

Automated acquisition and analysis of illegal fund accounts in gambling websites.
Eng. Appl. Artif. Intell., 2025

Efficient DNS over HTTPS servers discovery method: A voting-based stacked ensemble model with secure connection metadata.
Comput. Networks, 2025

Unmasking hidden threats: Enhanced detection of embedded malicious domains in pirate streaming videos.
Comput. Electr. Eng., 2025

2024
Text classification with improved word embedding and adaptive segmentation.
Expert Syst. Appl., March, 2024

Efficient and Privacy-Enhanced Federated Learning Based on Parameter Degradation.
IEEE Trans. Serv. Comput., 2024

Multi-Label Text Classification model integrating Label Attention and Historical Attention.
Knowl. Based Syst., 2024

6Rover: Leveraging Reinforcement Learning-based Address Pattern Mining Approach for Discovering Active Targets in IPv6 Unseeded Space.
CoRR, 2024

DNS root server resolution anomaly detection.
Comput. Secur., 2024

Censorship data-driven DNS resolution anomaly detection: An ensemble algorithm model with multivariate feature fusion.
Comput. Networks, 2024

Data mining based analysis of online gambling sites and illicit financial flows.
Proceedings of the 2024 International Conference on Cloud Computing and Big Data, 2024

2023
Configuration anormaly detection and resolution risk assessment of authoritative domain name server.
Comput. Secur., December, 2023

Research on Optimal Selection Measurement of DNS Root Instance.
IEEE Access, 2023

2022
Adaptive segmented webpage text based malicious website detection.
Comput. Networks, 2022

Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based Rules.
Comput. J., 2022

2020
Characterizing the Security Threats of Disposable Phone Numbers.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020