Guang Cheng

Orcid: 0000-0001-8642-4362

Affiliations:
  • Southeast University, Nanjing, China


According to our database1, Guang Cheng authored at least 153 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Classify Traffic Rather Than Flow: Versatile Multi-Flow Encrypted Traffic Classification With Flow Clustering.
IEEE Trans. Netw. Serv. Manag., April, 2024

RT-CBCH: Real-Time VPN Traffic Service Identification Based on Sampled Data in High-Speed Networks.
IEEE Trans. Netw. Serv. Manag., February, 2024

MTDroid: A Moving Target Defense-Based Android Malware Detector Against Evasion Attacks.
IEEE Trans. Inf. Forensics Secur., 2024

A Privacy-Preserving Incentive Mechanism for Mobile Crowdsensing Based on Blockchain.
IEEE Trans. Dependable Secur. Comput., 2024

DeMarking: A Defense for Network Flow Watermarking in Real-Time.
CoRR, 2024

SD-MDN-TM: A traceback and mitigation integrated mechanism against DDoS attacks with IP spoofing.
Comput. Networks, 2024

Video stalling identification for web live streaming under HTTP-FLV.
Comput. Networks, 2024

AHDom: Algorithmically generated domain detection using attribute heterogeneous graph neural network.
Comput. Networks, 2024

GateKeeper: An UltraLite malicious traffic identification method with dual-aspect optimization strategies on IoT gateways.
Comput. Networks, 2024

Identifying Video Resolution from Encrypted QUIC Streams in Segment-combined Transmission Scenarios.
Proceedings of the 34th edition of the Workshop on Network and Operating System Support for Digital Audio and Video, 2024

Improve Deep Forest with Learnable Layerwise Augmentation Policy Schedules.
Proceedings of the IEEE International Conference on Acoustics, 2024

Breaking Through the Diversity: Encrypted Video Identification Attack Based on QUIC Features.
Proceedings of the Computer Security - ESORICS 2024, 2024

SDT: Towards a Blockchain-Based Secure Data Trading Application.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2024

Unveiling the Unseen: Video Recognition Attacks on Social Software.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

ProfistMAC: A Protocol Finite State Machine Classifier via Graph Representation.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
AF-FDS: An Accurate, Fast, and Fine-Grained Detection Scheme for DDoS Attacks in High-Speed Networks With Asymmetric Routing.
IEEE Trans. Netw. Serv. Manag., December, 2023

TDS-KRFI: Reference Frame Identification for Live Web Streaming Toward HTTP Flash Video Protocol.
IEEE Trans. Netw. Serv. Manag., December, 2023

Hier-SFL: Client-edge-cloud collaborative traffic classification framework based on hierarchical federated split learning.
Future Gener. Comput. Syst., December, 2023

Corrigendum to "FastTraffic: A lightweight method for encrypted traffic fast classification" [Computer Networks, Volume 235, November 2023, 109965].
Comput. Networks, December, 2023

Fine-grained Ethereum behavior identification via encrypted traffic analysis with serialized backward inference.
Comput. Networks, December, 2023

FastTraffic: A lightweight method for encrypted traffic fast classification.
Comput. Networks, November, 2023

A Negotiation-Based Scheme for Interconnecting Heterogeneous Networks With Enhanced Services.
IEEE Netw., September, 2023

Towards verifiable and privacy-preserving account model on a consortium blockchain based on zk-SNARKs.
Peer Peer Netw. Appl., August, 2023

Snapshot for Power Grids IoT: Adaptive Measurement for Resilience Intelligent Internet of Things.
IEEE Internet Things J., August, 2023

Accurate compressed traffic detection via traffic analysis using Graph Convolutional Network based on graph structure feature.
Comput. Commun., July, 2023

PD-CPS: A practical scheme for detecting covert port scans in high-speed networks.
Comput. Networks, July, 2023

LossDetection: Real-Time Packet Loss Monitoring System for Sampled Traffic Data.
IEEE Trans. Netw. Serv. Manag., March, 2023

A Deep Subdomain Adaptation Network With Attention Mechanism for Malware Variant Traffic Identification at an IoT Edge Gateway.
IEEE Internet Things J., March, 2023

Resolution Identification of Encrypted Video Streaming Based on HTTP/2 Features.
ACM Trans. Multim. Comput. Commun. Appl., 2023

SINT: Toward a Blockchain-Based Secure In-Band Network Telemetry Architecture.
IEEE Trans. Inf. Forensics Secur., 2023

Toward Early and Accurate Network Intrusion Detection Using Graph Embedding.
IEEE Trans. Inf. Forensics Secur., 2023

ReplaceDGA: BiLSTM-Based Adversarial DGA With High Anti-Detection Ability.
IEEE Trans. Inf. Forensics Secur., 2023

MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks.
CoRR, 2023

Improve Deep Forest with Learnable Layerwise Augmentation Policy Schedule.
CoRR, 2023

Batch classifier with adaptive update for backbone traffic classification.
Comput. Commun., 2023

SharpEye: Identify mKCP Camouflage Traffic through Feature Optimization.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Cerberus: Efficient OSPS Traffic Identification through Multi-Task Learning.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Real-Time Platform Identification of VPN Video Streaming Based on Side-Channel Attack.
Proceedings of the ICT Systems Security and Privacy Protection, 2023

An Accurate and Real-Time Detection Method for Concealed Slow HTTP DoS in Backbone Network.
Proceedings of the ICT Systems Security and Privacy Protection, 2023

A Hypernetwork-based Personalized Federated Learning Framework for Encrypted Traffic Classification.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023

Identifying Fine-Grained Douyin User Behaviors via Analyzing Encrypted Network Traffic.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023

DarkTrans: A Blockchain-based Covert Communication Scheme with High Channel Capacity and Strong Concealment.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Real-Time Phishing Detection Based on URL Multi-Perspective Features: Aiming at the Real Web Environment.
Proceedings of the IEEE International Conference on Communications, 2023

A Novel Darknet Traffic Classification Method Based on Knowledge Graph with Dynamic Embedding Learning.
Proceedings of the IEEE International Conference on Communications, 2023

Detecting Cryptomining Traffic Over an Encrypted Proxy Based on K-S Test.
Proceedings of the IEEE International Conference on Communications, 2023

NFlowGAN: High-Utility Privacy-Preserving Network Flow Synthesis Based on GAN.
Proceedings of the IEEE International Conference on Communications, 2023

Website Fingerprinting with Packet Sampling: A More Realistic Approach in Real-World Networks.
Proceedings of the IEEE Global Communications Conference, 2023

Towards Early and Accurate IoT Device-Type Identification with Global Attention Mechanism.
Proceedings of the IEEE Global Communications Conference, 2023

Accurate Identification of Encrypted Videos in Asymmetric Routing Scenarios.
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023

2022
Attribute-Based Zero-Shot Learning for Encrypted Traffic Classification.
IEEE Trans. Netw. Serv. Manag., December, 2022

Toward Proactive and Efficient DDoS Mitigation in IIoT Systems: A Moving Target Defense Approach.
IEEE Trans. Ind. Informatics, 2022

A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT.
Secur. Commun. Networks, 2022

Identifying Ethereum traffic based on an active node library and DEVp2p features.
Future Gener. Comput. Syst., 2022

Length matters: Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning.
Digit. Commun. Networks, 2022

A quantitative framework for network resilience evaluation using Dynamic Bayesian Network.
Comput. Commun., 2022

Efficient sharing of privacy-preserving sensing data on consortium blockchain via group key agreement.
Comput. Commun., 2022

Verifying Privacy-Preserving Financing Orders on a Consortium Blockchain Based on zk-SNARKs.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

NT-RP: A High-Versatility Approach for Network Telemetry Based on FPGA Dynamic Reconfigurable Pipeline.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Higher Layers, Better Results: Application Layer Feature Engineering in Encrypted Traffic Classification.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Service-Based Identification of Highly Coupled Mobile Applications.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

Identify IoT Devices from Backbone Networks Using Lightweight Neural Networks.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

PSCM: Towards Practical Encrypted Unknown Protocol Classification.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Real-time Application Identification of RTC Media Streams via Encrypted Traffic Analysis.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

Towards Accurate DGA Detection based on Siamese Network with Insufficient Training Samples.
Proceedings of the IEEE International Conference on Communications, 2022

IM-Shield: A Novel Defense System against DDoS Attacks under IP Spoofing in High-speed Networks.
Proceedings of the IEEE International Conference on Communications, 2022

Real-time Identification of VPN Traffic based on Counting Bloom Filter and Chained Hash Table from Sampled Data in High-speed Networks.
Proceedings of the IEEE International Conference on Communications, 2022

Detecting Slow Port Scans of Long Duration in High-Speed Networks.
Proceedings of the IEEE Global Communications Conference, 2022

Private Protocol Traffic Identification Based on Sequence Statistical Fingerprint.
Proceedings of the IEEE Global Communications Conference, 2022

A Dynamic Access Control Model Based on Attributes and Intro VAE.
Proceedings of the IEEE Global Communications Conference, 2022

An Adversarial Learning-based Tor Malware Traffic Detection Model.
Proceedings of the IEEE Global Communications Conference, 2022

HDS: A Hierarchical Scheme for Accurate and Efficient DDoS Flooding Attack Detection.
Proceedings of the 23rd Asia-Pacific Network Operations and Management Symposium, 2022

Service classification of high-speed network traffic based on Two-Stage Clustering.
Proceedings of the 23rd Asia-Pacific Network Operations and Management Symposium, 2022

2021
An SDN-Enabled Proactive Defense Framework for DDoS Mitigation in IoT Networks.
IEEE Trans. Inf. Forensics Secur., 2021

CEBD: Contact-Evidence-Driven Blackhole Detection Based on Machine Learning in OppNets.
IEEE Trans. Comput. Soc. Syst., 2021

RT-SAD: Real-Time Sketch-Based Adaptive DDoS Detection for ISP Network.
Secur. Commun. Networks, 2021

SFIM: Identify user behavior based on stable features.
Peer-to-Peer Netw. Appl., 2021

Exploring real-time super-resolution generative adversarial networks.
Int. J. Sens. Networks, 2021

Secure IoT edge: Threat situation awareness based on network traffic.
Comput. Networks, 2021

A DDoS protection method based on traffic scheduling and scrubbing in SDN.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

FNEL: An Evolving Intrusion Detection System Based on Federated Never-Ending Learning.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Website Fingerprinting on Access network and Core Gateway.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Towards Efficient Co-audit of Privacy-Preserving Data on Consortium Blockchain via Group Key Agreement.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Analytical Optimal Solution of Selfish Node Detection with 2-hop Constraints in OppNets.
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021

Snapshot for IoT: Adaptive Measurement for Multidimensional QoS Resources.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

BCAC: Batch Classifier based on Agglomerative Clustering for traffic classification in a backbone network.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Real-time Packet Loss Detection for TCP and UDP Based on Feature-Sketch.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Monitoring Video Resolution of Adaptive Encrypted Video Traffic Based on HTTP/2 Features.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

A Lightweight Residual Networks Framework for DDoS Attack Classification Based on Federated Learning.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Mobile Application Encryption Traffic Classification Based On TLS Flow Sequence Network.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Accurate and Fast Detection of DDoS Attacks in High-Speed Network with Asymmetric Routing.
Proceedings of the IEEE Global Communications Conference, 2021

Detecting Cryptojacking Traffic Based on Network Behavior Features.
Proceedings of the IEEE Global Communications Conference, 2021

2020
A network-wide view-based detection and mitigation of a sophisticated Interest Flooding Attack.
EURASIP J. Wirel. Commun. Netw., 2020

Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processes.
Comput. Secur., 2020

A practical design of hash functions for IPv6 using multi-objective genetic programming.
Comput. Commun., 2020

Building an efficient intrusion detection system based on feature selection and ensemble classifier.
Comput. Networks, 2020

An on-demand off-path cache exploration based multipath forwarding strategy.
Comput. Networks, 2020

A Privacy-Preserving Authentication Scheme for VANETs based on Consortium Blockchain.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

EPDC: An Enhanced Pipelined Data Collection MAC for Duty-Cycled Linear Sensor Networks.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

BC-Sketch: A Simple Reversible Sketch for Detecting Network Anomalies.
Proceedings of the IEEE International Conference on Smart Data Services, 2020

Length Matters: Fast Internet Encrypted Traffic Service Classification based on Multi-PDU Lengths.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Identification of Encrypted Video Streaming Based on Differential Fingerprints.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Instagram User Behavior Identification Based on Multidimensional Features.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

A Demand and Responsiveness-based Caching Strategy for Network Coding Enabled NDN.
Proceedings of the IEEE Global Communications Conference, 2020

Towards Network Coding and Request Pipelining Enabled NDN for Big Data Transmission.
Proceedings of the IEEE Global Communications Conference, 2020

Effectiveness Evaluation Method for Cyber Deception Based on Dynamic Bayesian Attack Graph.
Proceedings of the CSSE 2020: 3rd International Conference on Computer Science and Software Engineering, 2020

2019
Estimating Cardinality of Arbitrary Expression of Multiple Tag Sets in a Distributed RFID System.
IEEE/ACM Trans. Netw., 2019

A Protocol for Simultaneously Estimating Moments and Popular Groups in a Multigroup RFID System.
IEEE/ACM Trans. Netw., 2019

dptCry: an approach to decrypting ransomware WannaCry based on API hooking.
CCF Trans. Netw., 2019

Exploration and Exploitation of Off-path Cached Content in Network Coding Enabled Named Data Networking.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Detecting and Mitigating A Sophisticated Interest Flooding Attack in NDN from the Network-Wide View.
Proceedings of the First IEEE International Workshop on Network Meets Intelligent Computations, 2019

Intelligence Enabled SDN Fault Localization via Programmable In-band Network Telemetry.
Proceedings of the 20th IEEE International Conference on High Performance Switching and Routing, 2019

Inferring ADU Combinations from Encrypted QUIC Stream.
Proceedings of the 14th International Conference on Future Internet Technologies, 2019

Enabling Linearly Homomorphic Signatures in Network Coding-based Named Data Networking.
Proceedings of the 14th International Conference on Future Internet Technologies, 2019

A Cost-effective Shuffling Method against DDoS Attacks using Moving Target Defense.
Proceedings of the 6th ACM Workshop on Moving Target Defense, 2019

RTSRGAN: Real-Time Super-Resolution Generative Adversarial Networks.
Proceedings of the Seventh International Conference on Advanced Cloud and Big Data, 2019

2018
QoE Assessment of Encrypted YouTube Adaptive Streaming for Energy Saving in Smart Cities.
IEEE Access, 2018

Mitigating Content Poisoning With Name-Key Based Forwarding and Multipath Forwarding Based Inband Probe for Energy Management in Smart Cities.
IEEE Access, 2018

Encrypted Traffic Identification Based on N-gram Entropy and Cumulative Sum Test.
Proceedings of the 13th International Conference on Future Internet Technologies, 2018

2017
Big Data Analytics for Program Popularity Prediction in Broadcast TV Industries.
IEEE Access, 2017

WENC: HTTPS Encrypted Traffic Classification Using Weighted Ensemble Learning and Markov Chain.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Program Popularity Prediction Approach for Internet TV Based on Trend Detecting.
Proceedings of the Industrial Networks and Intelligent Systems, 2017

eOpenFlow: Software defined sampling via a highly adoptable OpenFlow extension.
Proceedings of the IEEE International Conference on Communications, 2017

Adaptive Sampling for OpenFlow Network Measurement Methods.
Proceedings of the 12th International Conference on Future Internet Technologies, 2017

2016
Detecting domain-flux botnet based on DNS traffic features in managed network.
Secur. Commun. Networks, 2016

Automatic belief network modeling via policy inference for SDN fault localization.
J. Internet Serv. Appl., 2016

Progress in Command and Control Server Finding Schemes of Botnet.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

RBAS: A Real-Time User Behavior Analysis System for Internet TV in Cloud Computing.
Proceedings of the 11th International Conference on Future Internet Technologies, 2016

Detecting Network Topology and Packet Trajectory with SDN-enabled FPGA Platform.
Proceedings of the 11th International Conference on Future Internet Technologies, 2016

Service Oriented Verification Integrated Fault Reasoning for SDNs.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
Heavy hitter identification based on adaptive sampling with mapreduce.
Comput. Syst. Sci. Eng., 2015

Enhancing in-network caching by coupling cache placement, replacement and location.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A Novel Search Engine-Based Method for Discovering Command and Control Server.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2013
Catching modern botnets using active integrated evidential reasoning.
J. Internet Serv. Appl., 2013

PortView: identifying port roles based on port fuzzy macroscopic behavior.
J. Internet Serv. Appl., 2013

Line speed accurate superspreader identification using dynamic error compensation.
Comput. Commun., 2013

Make Your Webpage Carry Abundant Secret Information Unawarely.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2012
Estimating the number of active flows from sampled packets.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

A NetFlow v9 Measurement System with Network Performance Function.
Proceedings of the Internet and Distributed Computing Systems, 2012

2011
Probabilistic and reactive fault diagnosis for dynamic overlay networks.
Peer-to-Peer Netw. Appl., 2011

2009
Community-base Fault Diagnosis Using Incremental Belief Revision.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

A Trace Measurement and Analysis System for the Multi-Links CERNET Backbone.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

2008
Adaptive sampling algorithm for detection of superpoints.
Sci. China Ser. F Inf. Sci., 2008

XOR Hashing Algorithms to Measured Flows at the High-Speed Link.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

A Detecting Superpoint Algorithm on Multiple Sampling Technology.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

2007
A Resource-Efficient Flow Monitoring System.
IEEE Commun. Lett., 2007

A Double-Sampling and Hold Based Approach for Accurate and Efficient Network Flow Monitoring.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

A Hybrid Sampling Approach for Network Flow Monitoring.
Proceedings of the Fifth IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services, 2007

2006
An Algorithm for Estimation of Flow Length Distributions Using Heavy-Tailed Feature.
Proceedings of the Computational Science, 2006

Multi-Granularities Counting Bloom Filter.
Proceedings of the High Performance Computing and Communications, 2006

2005
A Time-Series Decomposed Model of Network Traffic.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

Network Traffic Sampling Model on Packet Identification.
Proceedings of the Networking, 2005

2004
A relative time model in a distributed network using exchanged time information.
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004

2002
A traffic sampling model for measurement using packet identification.
Proceedings of the Proceedings 10th IEEE International Conference on Networks: Towards Network Superiority, 2002


  Loading...