Shuhao Li

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
AC-DNN: An Adaptive Compact DNNs Architecture for Collaborative Learning Among Heterogeneous Smart Devices.
IEEE Internet Things J., June, 2024

An efficient topology optimization method based on adaptive reanalysis with projection reduction.
Eng. Comput., February, 2024

Let model keep evolving: Incremental learning for encrypted traffic classification.
Comput. Secur., February, 2024

SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification.
IEEE Trans. Inf. Forensics Secur., 2024

IceDiff: High Resolution and High-Quality Sea Ice Forecasting with Generative Diffusion Prior.
CoRR, 2024

LUK: Empowering Log Understanding with Expert Knowledge from Large Language Models.
CoRR, 2024

An efficient online successive reanalysis method for dynamic topology optimization.
Adv. Eng. Softw., 2024

Improved Sliding Mode Control Strategy Based on Photovoltaic-Energy Storage Virtual Synchronous Generator System.
Proceedings of the 33rd IEEE International Symposium on Industrial Electronics, 2024

A Targeted Adversarial Attack Method for Multi-Classification Malicious Traffic Detection.
Proceedings of the IEEE International Conference on Acoustics, 2024

ProxyKiller: An Anonymous Proxy Traffic Attack Model Based on Traffic Behavior Graphs.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
Optimal selling format considering price discount strategy in live-streaming commerce.
Eur. J. Oper. Res., September, 2023

Membership Inference Attacks Against Deep Learning Models via Logits Distribution.
IEEE Trans. Dependable Secur. Comput., 2023

Dynamically configured physics-informed neural network in topology optimization applications.
CoRR, 2023

A novel reduced basis method for adjoint sensitivity analysis of dynamic topology optimization.
CoRR, 2023

GPMT: Generating practical malicious traffic based on adversarial attacks with little prior knowledge.
Comput. Secur., 2023

Toward IoT device fingerprinting from proprietary protocol traffic via key-blocks aware approach.
Comput. Secur., 2023

An Empirical Study on Fine-Tuning Large Language Models of Code for Automated Program Repair.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Text Classification In The Wild: A Large-Scale Long-Tailed Name Normalization Dataset.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
Study on the influence of blade on electromagnetic scattering characteristics in the open-ended cavity.
J. Comput. Sci., 2022

An efficient topology optimization based on multigrid assisted reanalysis for heat transfer problem.
CoRR, 2022

l-Leaks: Membership Inference Attacks with Logits.
CoRR, 2022

Adaptive auxiliary reduced model reanalysis-based efficient topology optimization method.
CoRR, 2022

Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features.
Comput. Secur., 2022

Analysis and Detection against Network Attacks in the Overlapping Phenomenon of Behavior Attribute.
Comput. Secur., 2022

A longitudinal Measurement and Analysis Study of Mozi, an Evolving P2P IoT Botnet.
Proceedings of the IEEE International Conference on Trust, 2022

Multi-relational Instruction Association Graph for Cross-Architecture Binary Similarity Comparison.
Proceedings of the Security and Privacy in Communication Networks, 2022

RAAM: A Restricted Adversarial Attack Model with Adding Perturbations to Traffic Features.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

Analysis and Detection Against Overlapping Phenomenon of Behavioral Attribute in Network Attacks.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

A Dual-Branch Self-attention Method for Mobile Malware Detection via Network Traffic.
Proceedings of the International Joint Conference on Neural Networks, 2022

Grid-Connected Inverter Control Via Linear Parameter-Varying System Approach.
Proceedings of the IECON 2022, 2022

Effective Malicious URL Detection by Using Generative Adversarial Networks.
Proceedings of the Web Engineering - 22nd International Conference, 2022

Leveraging Zero-Payload Packets to Detect Mobile Malware based on Network Traffic.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

HNOP: Attack Traffic Detection Based on Hierarchical Node Hopping Features of Packets.
Proceedings of the Computational Science - ICCS 2022, 2022

DITA-NCG: Detecting Information Theft Attack Based on Node Communication Graph.
Proceedings of the Computational Science - ICCS 2022, 2022

TrafficGCN: Mobile Application Encrypted Traffic Classification Based on GCN.
Proceedings of the IEEE Global Communications Conference, 2022

VT-GAT: A Novel VPN Encrypted Traffic Classification Model Based on Graph Attention Neural Network.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022

A Longitudinal Measurement and Analysis of Pink, a Hybrid P2P IoT Botnet.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022

Evading Encrypted Traffic Classifiers by Transferable Adversarial Traffic.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022

2021
iPro2L-PSTKNC: A Two-Layer Predictor for Discovering Various Types of Promoters by Position Specific of Nucleotide Composition.
IEEE J. Biomed. Health Informatics, 2021

A Malicious URL Detection Model Based on Convolutional Neural Network.
Secur. Commun. Networks, 2021

Risk assessment for supply chain based on Cloud model.
J. Intell. Fuzzy Syst., 2021

LIFH: Learning Interactive Features from HTTP Payload using Image Reconstruction.
Proceedings of the ICC 2021, 2021

The Title of the Paper: Decoupled Power Regulation for Dual-Frequency Induction Heating Power Supply with Single Full-Bridge Inversion Topology.
Proceedings of the EEET 2021: 4th International Conference on Electronics and Electrical Engineering Technology, Nanjing, China, December 3, 2021

2020
HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics.
Comput. Secur., 2020

A Malicious URL Detection Model Based on Convolutional Neural Network.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network.
Proceedings of the Computational Science - ICCS 2020, 2020

Challenge Collapsar (CC) Attack Traffic Detection Based on Packet Field Differentiated Preprocessing and Deep Neural Network.
Proceedings of the Computational Science - ICCS 2020, 2020

An two-layer predictive model of ensemble classifier chain for detecting antimicrobial peptides.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2020

Author Name Disambiguation on Heterogeneous Information Network with Adversarial Representation Learning.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Core Percolation in Interdependent Networks.
IEEE Trans. Netw. Sci. Eng., 2019

A Method of HTTP Malicious Traffic Detection on Mobile Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

MURITE-Detector: Identifying User-Role in Information Theft Events of Mobile Network.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Method Based on Hierarchical Spatiotemporal Features for Trojan Traffic Detection.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Mobile Application Identification Over HTTPS Traffic Based on Multi-view Features.
Proceedings of the 26th International Conference on Telecommunications, 2019

2018
MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

An Analysis of a New Detection Method for Spear Phishing Attack.
Proceedings of the Communications, Signal Processing, and Systems, 2018

MalShoot: Shooting Malicious Domains Through Graph Embedding on Passive DNS Data.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

MUI-defender: CNN-Driven, Network Flow-Based Information Theft Detection for Mobile Users.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

2017
Discovering Malicious Domains through Alias-Canonical Graph.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Detecting DNS Tunnel through Binary-Classification Based on Behavior Features.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Detecting Information Theft Based on Mobile Network Flows for Android Users.
Proceedings of the 2017 International Conference on Networking, Architecture, and Storage, 2017

Risks and risk control of wind power enterprises.
Proceedings of the 13th International Conference on Natural Computation, 2017

2015
SMS Worm Propagation Over Contact Social Networks: Modeling and Validation.
IEEE Trans. Inf. Forensics Secur., 2015

Botnet spoofing: fighting botnet with itself.
Secur. Commun. Networks, 2015

2014
DR-SNBot: A Social Network-Based Botnet with Strong Destroy-Resistance.
Proceedings of the 9th IEEE International Conference on Networking, 2014

2012
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks.
Proceedings of the Information Security and Privacy Research, 2012

2011
Research on Real-time Publish/Subscribe System supported by Data-Integration.
J. Softw., 2011

A Propagation Model for Social Engineering Botnets in Social Networks.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

Using Entropy to Classify Traffic More Deeply.
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011

Poster: recoverable botnets: a hybrid C&C approach.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Scenario-based verification of real-time systems using Uppaal.
Formal Methods Syst. Des., 2010

Testing Real-Time Systems under Uncertainty.
Proceedings of the Formal Methods for Components and Objects - 9th International Symposium, 2010

Verification and controller synthesis for resource-constrained real-time systems: Case study of an autonomous truck.
Proceedings of 15th IEEE International Conference on Emerging Technologies and Factory Automation, 2010

Efficient Two-Dimensional Error Codes for Multiple Bit Upsets Mitigation in Memory.
Proceedings of the 25th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, 2010

Scenario-based analysis and synthesis of real-time systems using uppaal.
Proceedings of the Design, Automation and Test in Europe, 2010

2009
Automated Worst-Case Execution Time Analysis Based on Program Modes.
Comput. J., 2009

Timed Testing under Partial Observability.
Proceedings of the Second International Conference on Software Testing Verification and Validation, 2009

Verifying Real-Time Systems against Scenario-Based Requirements.
Proceedings of the FM 2009: Formal Methods, 2009

2008
Cooperative Testing of Timed Systems.
Proceedings of the Fourth Workshop on Model Based Testing, 2008

A Quasi Word-Based Compression Method of English Text Using Byte-Oriented Coding Scheme.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

A Game-Theoretic Approach to Real-Time System Testing.
Proceedings of the Design, Automation and Test in Europe, 2008

2006
Automated WCET Analysis Based on Program Modes.
Proceedings of the 2006 International Workshop on Automation of Software Test, 2006

2005
An Optimized Method for Automatic Test Oracle Generation from Real-Time Specification.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005

Configuration-Oriented Symbolic Test Sequence Construction Method for EFSM.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

2004
Property-Oriented Testing: An Approach to Focusing Testing Efforts on Behaviours of Interest.
Proceedings of the Testing of Component-Based Systems and Software Quality, 2004

Property-Oriented Test Generation from UML Statecharts.
Proceedings of the 19th IEEE International Conference on Automated Software Engineering (ASE 2004), 2004

Property-Oriented Testing of Real-Time Systems.
Proceedings of the 11th Asia-Pacific Software Engineering Conference (APSEC 2004), 30 November, 2004


  Loading...