Yipeng Wang

Orcid: 0000-0002-8188-4666

Affiliations:
  • Beijing University of Technology, Faculty of Information Technology, China
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China (former)
  • Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China (PhD 2014)


According to our database1, Yipeng Wang authored at least 62 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Packet Sequence Permutation-Aware Approach to Robust Network Traffic Classification.
IEEE Netw. Lett., September, 2024

An adaptive classification and updating method for unknown network traffic in open environments.
Comput. Networks, January, 2024

MPAF: Encrypted Traffic Classification With Multi-Phase Attribute Fingerprint.
IEEE Trans. Inf. Forensics Secur., 2024

2023
A Multi-Perspective Feature Approach to Few-Shot Classification of IoT Traffic.
IEEE Trans. Green Commun. Netw., December, 2023

MSGAN: multi-stage generative adversarial network-based data recovery in cyber-attacks.
Neural Comput. Appl., October, 2023

Relational reasoning-based approach for network protocol reverse engineering.
Comput. Networks, July, 2023

A Two-Phase Approach to Fast and Accurate Classification of Encrypted Traffic.
IEEE/ACM Trans. Netw., June, 2023

Intrusion Detection System Based on In-Depth Understandings of Industrial Control Logic.
IEEE Trans. Ind. Informatics, March, 2023

Encrypted TLS Traffic Classification on Cloud Platforms.
IEEE/ACM Trans. Netw., February, 2023

A data skew-based unknown traffic classification approach for TLS applications.
Future Gener. Comput. Syst., 2023

Advances and Challenges of Multi-task Learning Method in Recommender System: A Survey.
CoRR, 2023

Joint Trajectory Optimization and Task Offloading for UAV-Assisted Mobile Edge Computing.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023

2022
A Multi-Scale Feature Attention Approach to Network Traffic Classification and Its Model Explanation.
IEEE Trans. Netw. Serv. Manag., 2022

Correction to: DEIDS: a novel intrusion detection system for industrial control systems.
Neural Comput. Appl., 2022

DEIDS: a novel intrusion detection system for industrial control systems.
Neural Comput. Appl., 2022

A Few-Shot Learning Based Approach to IoT Traffic Classification.
IEEE Commun. Lett., 2022

Identifying malicious nodes in wireless sensor networks based on correlation detection.
Comput. Secur., 2022

Autonomous Anti - interference Identification of $\text{IoT}$ Device Traffic based on Convolutional Neural Network.
Proceedings of the International Joint Conference on Neural Networks, 2022

FITIC: A Few-shot Learning Based IoT Traffic Classification Method.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

Zen-tor: A Zero Knowledge Known-Unknown Traffic Classification Method.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Finding disposable domain names: A linguistics-based stacking approach.
Comput. Networks, 2021

Inspector: A Semantics-Driven Approach to Automatic Protocol Reverse Engineering.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

2020
Khaos: An Adversarial Neural Network DGA With High Anti-Detection Ability.
IEEE Trans. Inf. Forensics Secur., 2020

A Feature Ensemble-based Approach to Malicious Domain Name Identification from Valid DNS Responses.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Unified Graph Embedding-Based Anomalous Edge Detection.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Gated POS-Level Language Model for Authorship Verification.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

A Multi-feature-based Approach to Malicious Domain Name Identification from DNS Traffic.
Proceedings of the 27th International Conference on Telecommunications, 2020

Joint Character-Level Word Embedding and Adversarial Stability Training to Defend Adversarial Text.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
CCGA: Clustering and Capturing Group Activities for DGA-Based Botnets Detection.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Linguistics-based Stacking Approach to Disposable Domains Detection.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

A Comprehensive Measurement Study of Domain-Squatting Abuse.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Pontus: A Linguistics-Based DGA Detection System.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Translating with Bilingual Topic Knowledge for Neural Machine Translation.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Information Propagation Prediction Based on Key Users Authentication in Microblogging.
Secur. Commun. Networks, 2018

A cascade forest approach to application classification of mobile traces.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Detecting Domain Generation Algorithms with Convolutional Neural Language Models.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Stacking Approach to Objectionable-Related Domain Names Identification by Passive DNS Traffic (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

2017
A nonparametric approach to the automated protocol fingerprint inference.
J. Netw. Comput. Appl., 2017

Rethinking robust and accurate application protocol identification.
Comput. Networks, 2017

Supporting Real-Time Analytic Queries in Big and Fast Data Environments.
Proceedings of the Database Systems for Advanced Applications, 2017

2016
A Semantics-Aware Approach to the Automated Network Protocol Identification.
IEEE/ACM Trans. Netw., 2016

Multiple-combinational-channel: A network architecture for workload balance and deadlock free.
Future Gener. Comput. Syst., 2016

2015
Unsupervised adaptive sign language recognition based on hypothesis comparison guided cross validation and linguistic prior filtering.
Neurocomputing, 2015

Update vs. upgrade: Modeling with indeterminate multi-class active learning.
Neurocomputing, 2015

A Markov Random Field Approach to Automated Protocol Signature Inference.
Proceedings of the Security and Privacy in Communication Networks, 2015

Rethinking Robust and Accurate Application Protocol Identification: A Nonparametric Approach.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

2014
Visual Similarity Based Anti-phishing with the Combination of Local and Global Features.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Segmentation Pattern Based Approach to Automated Protocol Identification.
Proceedings of the 15th International Conference on Parallel and Distributed Computing, 2014

Text Detection in Natural Scene Images with Stroke Width Clustering and Superpixel.
Proceedings of the Advances in Multimedia Information Processing - PCM 2014, 2014

Text localization in natural scene images with stroke width histogram and superpixel.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2014

Perspective Scene Text Recognition with Feature Compression and Ranking.
Proceedings of the Computer Vision - ACCV 2014 Workshops, 2014

2012
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks.
Proceedings of the Information Security and Privacy Research, 2012

A General Framework of Trojan Communication Detection Based on Network Traces.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

A semantics aware approach to automated reverse engineering unknown protocols.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

2011
Traffic classification beyond application level: identifying content types from network traces.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Biprominer: Automatic Mining of Binary Protocol Features.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

A Propagation Model for Social Engineering Botnets in Social Networks.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

Using Entropy to Classify Traffic More Deeply.
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011

Performance evaluation of Xunlei peer-to-peer network: A measurement study.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

Inferring Protocol State Machine from Network Traces: A Probabilistic Approach.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Inferring Protocol State Machine from Real-World Trace.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010


  Loading...