Futai Zou

Orcid: 0000-0002-5898-7317

According to our database1, Futai Zou authored at least 58 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Detection and Analysis of Broken Access Control Vulnerabilities in App-Cloud Interaction in IoT.
IEEE Internet Things J., September, 2024

LLM-TIKG: Threat intelligence knowledge graph construction utilizing large language model.
Comput. Secur., 2024

Trustful Blockchain-Enabled Identity Management for VANET with Short-Latency Authentication.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

A Secure and Private Authentication Based on Radio Frequency Fingerprinting.
Proceedings of the IEEE International Conference on Communications, 2024

2023
SlicedLocator: Code vulnerability locator based on sliced dependence graph.
Comput. Secur., November, 2023

Multi-field relation mining for malicious HTTP traffic detection based on attention and cross network.
J. Inf. Secur. Appl., March, 2023

Link Prediction-Based Multi-Identity Recognition of Darknet Vendors.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

2022
FS-IDS: A framework for intrusion detection based on few-shot learning.
Comput. Secur., 2022

Towards High Transferability on Neural Network for Black-Box Adversarial Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2022

Breaking Tor's Anonymity by Modifying Cell's Command.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Tracing Tor Hidden Service Through Protocol Characteristics.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

QUIC-CNN: Website Fingerprinting for QUIC Traffic in Tor Network.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
Obfuscated Tor Traffic Identification Based on Sliding Window.
Secur. Commun. Networks, 2021

DePL: Detecting Privacy Leakage in DNS-over-HTTPS Traffic.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Automatic Generation of Malware Threat Intelligence from Unstructured Malware Traces.
Proceedings of the Security and Privacy in Communication Networks, 2021

Word-Map: Using Community Detection Algorithm to Detect AGDs.
Proceedings of the Information Security - 24th International Conference, 2021

DeepMark: Embedding Watermarks into Deep Neural Network Using Pruning.
Proceedings of the 33rd IEEE International Conference on Tools with Artificial Intelligence, 2021

Deep Reinforcement Learning for Intelligent Computing and Content Edge Service in ICN-based IoV.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Browser Fingerprinting Identification Using Incremental Clustering Algorithm Based on Autoencoder.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Detecting Data Leakage in DNS Traffic based on Time Series Anomaly Detection.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

SPIN: Structure-Preserving Inner Offset Network for Scene Text Recognition.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Mobile terminal identity authentication system based on behavioral characteristics.
Int. J. Distributed Sens. Networks, 2020

Traffic Classification of User Behaviors in Tor, I2P, ZeroNet, Freenet.
Proceedings of the 19th IEEE International Conference on Trust, 2020

pyDNetTopic: A Framework for Uncovering What Darknet Market Users Talking About.
Proceedings of the Security and Privacy in Communication Networks, 2020

Detecting Dictionary Based AGDs Based on Community Detection.
Proceedings of the Security and Privacy in Communication Networks, 2020

Quantitatively Assessing the Cyber-to-Physical Risk of Industrial Cyber-Physical Systems.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

2019
CCID: Cross-Correlation Identity Distinction Method for Detecting Shrew DDoS.
Wirel. Commun. Mob. Comput., 2019

Generating Adversarial Samples With Constrained Wasserstein Distance.
IEEE Access, 2019

Adversarial Seeded Sequence Growing for Weakly-Supervised Temporal Action Localization.
Proceedings of the 27th ACM International Conference on Multimedia, 2019

A Novel Image-Based Malware Classification Model Using Deep Learning.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Detecting Malicious Domains Using Modified SVM Model.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Evolutionary Anti-Jamming Game in Non-Orthogonal Multiple Access System.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

An Encrypted Malicious Traffic Detection System Based on Neural Network.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

2018
Web Phishing Detection Using a Deep Learning Framework.
Wirel. Commun. Mob. Comput., 2018

Detecting Domain-Flux Malware Using DNS Failure Traffic.
Int. J. Softw. Eng. Knowl. Eng., 2018

Multi-SDN Based Cooperation Scheme for DDoS Attack Defense.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

Intelligent Large-Scale AP Control with Remarkable Energy Saving in Campus WiFi System.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

2017
Detecting malware based on expired command-and-control traffic.
Int. J. Distributed Sens. Networks, 2017

2016
Survey on Domain Name System Security.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Attribute Credibility Based Sybil Goup Detection in Online Social Networks.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Detecting Malicious Server Based on Server-to-Server Realation Graph.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
Detecting Malware Based on DNS Graph Mining.
Int. J. Distributed Sens. Networks, 2015

2014
MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of Things.
Proceedings of the Genetic and Evolutionary Computing, 2014

2012
Cost based routing in delay tolerant networks.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

2010
Securing Wireless Mesh Network with Mobile Firewall.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2010

2009
On Efficient Content Matching in Distributed Pub/Sub Systems.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2007
Targeted Local Immunization in Scale-Free Peer-to-Peer Networks.
J. Comput. Sci. Technol., 2007

2005
eDSR: A Decentralized Service Registry for e-Commerce.
Proceedings of the 2005 IEEE International Conference on e-Business Engineering (ICEBE 2005), 2005

Building Efficient Super-Peer Overlay Network for DHT Systems.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

2004
CCAN: Cache-Based CAN Using the Small World Model.
Proceedings of the Advances in Web-Age Information Management: 5th International Conference, 2004

Build a Distributed Repository for Web Service Discovery Based on Peer-to-Peer Network.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004

Using the Linking Model to Understand the Performance of DHT Routing Algorithms.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

A Novel Approach for Constructing Small World in Structured P2P Systems.
Proceedings of the Grid and Cooperative Computing, 2004

pXRepository: A Peer-to-Peer XML Repository for Web Service Discovery.
Proceedings of the Grid and Cooperative Computing, 2004

PWSD: A Scalable Web Service Discovery Architecture Based on Peer-to-Peer Overlay Network.
Proceedings of the Advanced Web Technologies and Applications, 2004

2003
Effect of Links on DHT Routing Algorithms.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

DHCS: A Case of Knowledge Share in Cooperative Computing Environment.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...