Longtao He

According to our database1, Longtao He authored at least 24 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CETP: A novel semi-supervised framework based on contrastive pre-training for imbalanced encrypted traffic classification.
Comput. Secur., 2024

2023
Multilingual Entity and Relation Extraction from Unified to Language-specific Training.
CoRR, 2023

A Survey on Deep Learning for Website Fingerprinting Attacks and Defenses.
IEEE Access, 2023

2022
Cdga: A GAN-based Controllable Domain Generation Algorithm.
Proceedings of the IEEE International Conference on Trust, 2022

AGDB: A Dictionary-based Malicious Domain Detection Method based on Representation Fusion.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

ReGFFM : A New Graph Model Designed with Spatial Information for Potential Social Connection Mining.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
Privacy Model: Detect Privacy Leakage for Chinese Browser Extensions.
IEEE Access, 2021

2020
A Multi-source Self-adaptive Transfer Learning Model for Mining Social Links.
Proceedings of the Knowledge Science, Engineering and Management, 2020

Role Identification of Domain Name Server Using Machine Learning based on DNS Response Features.
Proceedings of the ICISS 2020: The 3rd International Conference on Information Science and System, 2020

CDN-hosted Domain Detection with Supervised Machine Learning through DNS Records.
Proceedings of the ICISS 2020: The 3rd International Conference on Information Science and System, 2020

Active Measurement of Open Resolver Service Nodes.
Proceedings of the CSAE 2020: The 4th International Conference on Computer Science and Application Engineering, 2020

2019
Large-scale Detection of Privacy Leaks for BAT Browsers Extensions in China.
Proceedings of the 2019 International Symposium on Theoretical Aspects of Software Engineering, 2019

FS-Net: A Flow Sequence Network For Encrypted Traffic Classification.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

2018
WLRRS: A new recommendation system based on weighted linear regression models.
Comput. Electr. Eng., 2018

MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

2017
Network Traffic Based iOS Application Automatically Analyzing System.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Mining Information on Bitcoin Network Data.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

2016
Information fusion-based method for distributed domain name system cache poisoning attack detection and identification.
IET Inf. Secur., 2016

2014
Analysis and Detection of Bogus Behavior in Web Crawler Measurement.
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014

2012
Security and Cost Analyses of DNSSEC Protocol.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Exploiting Artificial Immune systems to detect unknown DoS attacks in real-time.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

TMT: A new Tunable Mechanism of Tor based on the path length.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2005
The wide window string matching algorithm.
Theor. Comput. Sci., 2005

2004
Linear Nondeterministic Dawg String Matching Algorithm.
Proceedings of the String Processing and Information Retrieval, 2004


  Loading...