Zhigang Lu
Orcid: 0000-0002-2552-6231Affiliations:
- Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
- University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China
According to our database1,
Zhigang Lu
authored at least 53 papers
between 2016 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Phishing behavior detection on different blockchains via adversarial domain adaptation.
Cybersecur., December, 2024
ProcSAGE: an efficient host threat detection method based on graph representation learning.
Cybersecur., December, 2024
Unveiling shadows: A comprehensive framework for insider threat detection based on statistical and sequential analysis.
Comput. Secur., March, 2024
Comput. Secur., March, 2024
ECNet: Robust Malicious Network Traffic Detection With Multi-View Feature and Confidence Mechanism.
IEEE Trans. Inf. Forensics Secur., 2024
FG-SAT: Efficient Flow Graph for Encrypted Traffic Classification under Environment Shifts.
CoRR, 2024
ContraMTD: An Unsupervised Malicious Network Traffic Detection Method based on Contrastive Learning.
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
Aparecium: understanding and detecting scam behaviors on Ethereum via biased random walk.
Cybersecur., December, 2023
Comput. Secur., May, 2023
IEEE Trans. Inf. Forensics Secur., 2023
Comput. Secur., 2023
C-BEDIM and S-BEDIM: Lateral movement detection in enterprise network through behavior deviation measurement.
Comput. Secur., 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the IEEE International Conference on Multimedia and Expo Workshops, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
Only Header: a reliable encrypted traffic classification framework without privacy risk.
Soft Comput., December, 2022
Proceedings of the Security and Privacy in Communication Networks, 2022
Proceedings of the IEEE International Conference on Communications, 2022
An Approach for Predicting the Costs of Forwarding Contracts using Gradient Boosting.
Proceedings of the 17th Conference on Computer Science and Intelligence Systems, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Caps-LSTM: A Novel Hierarchical Encrypted VPN Network Traffic Identification Using CapsNet and LSTM.
Proceedings of the Science of Cyber Security - Third International Conference, 2021
BEDIM: Lateral Movement Detection In Enterprise Network Through Behavior Deviation Measurement.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
2020
THS-IDPC: A three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection.
J. Supercomput., 2020
CoRR, 2020
CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification.
Comput. Networks, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
MTLAT: A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER.
Proceedings of the Network and Parallel Computing, 2020
Proceedings of the Computational Science - ICCS 2020, 2020
Proceedings of the Computational Science - ICCS 2020, 2020
2019
STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-Based Network Attack Detection.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the Knowledge Science, Engineering and Management, 2019
Proceedings of the Knowledge Science, Engineering and Management, 2019
isAnon: Flow-Based Anonymity Network Traffic Identification Using Extreme Gradient Boosting.
Proceedings of the International Joint Conference on Neural Networks, 2019
Marrying Graph Kernel with Deep Neural Network: A Case Study for Network Anomaly Detection.
Proceedings of the Computational Science - ICCS 2019, 2019
Proceedings of the Computational Science - ICCS 2019, 2019
A Session-Packets-Based Encrypted Traffic Classification Using Capsule Neural Networks.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
Retweeting Prediction Using Matrix Factorization with Binomial Distribution and Contextual Information.
Proceedings of the Database Systems for Advanced Applications, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
基于威胁情报平台的恶意URL检测研究 (Study on Malicious URL Detection Based on Threat Intelligence Platform).
计算机科学, 2018
Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection.
Proceedings of the 17th IEEE International Conference On Trust, 2018
DeepGFL: Deep Feature Learning via Graph for Attack Detection on Flow-Based Network Traffic.
Proceedings of the 2018 IEEE Military Communications Conference, 2018
A Novel Approach for Identifying Lateral Movement Attacks Based on Network Embedding.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Proceedings of the Computational Science - ICCS 2018, 2018
2016
Proceedings of the Intelligent Information Processing VIII, 2016