Bo Jiang

Orcid: 0000-0002-7185-990X

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
  • University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China


According to our database1, Bo Jiang authored at least 47 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ProcSAGE: an efficient host threat detection method based on graph representation learning.
Cybersecur., December, 2024

Unveiling encrypted traffic types through hierarchical network characteristics.
Comput. Secur., March, 2024

ECNet: Robust Malicious Network Traffic Detection With Multi-View Feature and Confidence Mechanism.
IEEE Trans. Inf. Forensics Secur., 2024

FG-SAT: Efficient Flow Graph for Encrypted Traffic Classification under Environment Shifts.
CoRR, 2024

A survey of large language models for cyber threat detection.
Comput. Secur., 2024

Graph-based insider threat detection: A survey.
Comput. Networks, 2024

ContraMTD: An Unsupervised Malicious Network Traffic Detection Method based on Contrastive Learning.
Proceedings of the ACM on Web Conference 2024, 2024

Multi-language Webshell Detection based on Abstract Syntax Tree and TreeLSTM.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

HBGraph: a Host Behavior Graph Model for C&C Traffic Detection.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
Network intrusion detection based on n-gram frequency and time-aware transformer.
Comput. Secur., May, 2023

CBSeq: A Channel-Level Behavior Sequence for Encrypted Malware Traffic Detection.
IEEE Trans. Inf. Forensics Secur., 2023

Insider Threat Detection Based On Heterogeneous Graph Neural Network.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Few-Shot Network Traffic Anomaly Detection Based on Siamese Neural Network.
Proceedings of the IEEE International Conference on Communications, 2023

HLMD: Detecting Lateral Movement Using Heterogeneous Graph Model.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

2022
Network traffic analysis over clustering-based collective anomaly detection.
Comput. Networks, 2022

CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network.
Proceedings of the Security and Privacy in Communication Networks, 2022

IV-IDM: Reliable Intrusion Detection Method based on Involution and Voting.
Proceedings of the IEEE International Conference on Communications, 2022

2021
Caps-LSTM: A Novel Hierarchical Encrypted VPN Network Traffic Identification Using CapsNet and LSTM.
Proceedings of the Science of Cyber Security - Third International Conference, 2021

2020
CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification.
Comput. Networks, 2020

Cybersecurity Named Entity Recognition Using Multi-Modal Ensemble Learning.
IEEE Access, 2020

Heterogeneous Information Network Embedding for Mention Recommendation.
IEEE Access, 2020

Topic Modeling for Short Texts via Word Embedding and Document Correlation.
IEEE Access, 2020

STIDM: A Spatial and Temporal Aware Intrusion Detection Model.
Proceedings of the 19th IEEE International Conference on Trust, 2020

MTLAT: A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER.
Proceedings of the Network and Parallel Computing, 2020

Malicious Domain Detection Based on K-means and SMOTE.
Proceedings of the Computational Science - ICCS 2020, 2020

Social Recommendation in Heterogeneous Evolving Relation Network.
Proceedings of the Computational Science - ICCS 2020, 2020

2019
Retweet Prediction Using Context-Aware Coupled Matrix-Tensor Factorization.
Proceedings of the Knowledge Science, Engineering and Management, 2019

isAnon: Flow-Based Anonymity Network Traffic Identification Using Extreme Gradient Boosting.
Proceedings of the International Joint Conference on Neural Networks, 2019

Mention Recommendation with Context-Aware Probabilistic Matrix Factorization.
Proceedings of the Computational Science - ICCS 2019, 2019

A Session-Packets-Based Encrypted Traffic Classification Using Capsule Neural Networks.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Retweeting Prediction Using Matrix Factorization with Binomial Distribution and Contextual Information.
Proceedings of the Database Systems for Advanced Applications, 2019

An Approach for Scale Suspicious Network Events Detection.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

DSINE: Deep Structural Influence Learning via Network Embedding.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
A Novel Approach for Identifying Lateral Movement Attacks Based on Network Embedding.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Retweet Prediction Using Social-Aware Probabilistic Matrix Factorization.
Proceedings of the Computational Science - ICCS 2018, 2018

2017
Identification of Influential Users Based on Topic-Behavior Influence Tree in Social Networks.
Proceedings of the Natural Language Processing and Chinese Computing, 2017

2016
Domain Dictionary-Based Topic Modeling for Social Text.
Proceedings of the Web Information Systems Engineering - WISE 2016, 2016

Unifying User and Message Clustering Information for Retweeting Behavior Prediction.
Proceedings of the Web-Age Information Management - 17th International Conference, 2016

Retweeting Behavior Prediction Based on One-Class Collaborative Filtering in Social Networks.
Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval, 2016

RTPMF: Leveraging User and Message Embeddings for Retweeting Behavior Prediction.
Proceedings of the International Conference on Computational Science 2016, 2016

2015
Predicting User Mention Behavior in Social Networks.
Proceedings of the Natural Language Processing and Chinese Computing - 4th CCF Conference, 2015

Modeling Temporal Dynamics of User Interests in Online Social Networks.
Proceedings of the International Conference on Computational Science, 2015

Message Clustering based Matrix Factorization Model for Retweeting Behavior Prediction.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

A Multi-view Retweeting Behaviors Prediction in Social Networks.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

2014
An Improved Community Partition Algorithm Integrating Mutual Information.
J. Networks, 2014

Preventing the diffusion of negative information based on local influence tree.
Proceedings of the Symposium on Applied Computing, 2014

2013
Finding High-Influence Leader Based on Local Metrics.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013


  Loading...