APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning. IEEE Transactions on Dependable and Secure Computing,2022. (SCI 二区/CCF A)
fuzzyCom: Privacy-aware Trajectory Data Compression Using Fuzzy Sets in Edge Vehicular Networks. International Conference on Mobile Ad Hoc and Smart Systems (IEEE Mass),2022. (CCF C)
Language Inclusion Checking of Timed Automata Based on Property Patterns. Applied Sciences-Basel, 12(24),2022. (SCI 二区)
Private Cell-ID Trajectory Prediction Using Multi-Graph Embedding and Encoder-Decoder Network. IEEE Transactions on Mobile Computing, 21(8):2967-2977, 2022. (SCI 一区/CCF A)
Privacy-Aware Fuzzy Range Query Processing Over Distributed Edge Devices. IEEE Transactions on Fuzzy Systems, 30(5):1421-1435, 2022. (SCI 一区/CCF B)
EspialCog: General, Efficient and Robust Mobile User Implicit Authentication in Noisy Environment. IEEE Transactions on Mobile Computing, 21(2):555-572, 2022. (SCI 一区/CCF A)
Privacy-Aware Fuzzy Skyline Parking Recommendation Using Edge Traffic Facilities. IEEE Transactions on Vehicular Technology, 70(10):9775-9786, 2021. (SCI 一区)
A Domain-Specific Non-Factoid Question Answering System based on Terminology Mining and Siamese Neural Network. Journal of Information Science and Engineering, 37(4):959-974, 2021. (SCI 四区)
Temporal Multi-Graph Convolutional Network for Traffic Flow Prediction. IEEE Transactions on Intelligent Transportation Systems, 22(6):3337-3348, 2021. (SCI 一区/CCF B)高被引论文
FuzzySkyline: QoS-Aware Fuzzy Skyline Parking Recommendation Using Edge Traffic Facilities. International Workshop on Quality of Service,2021. (CCF B)
One Cycle Attack: Fool Sensor-Based Personal Gait Authentication With Clustering. IEEE Transactions on Information Forensics and Security, 16:553-568, 2021. (SCI 一区/CCF A)
General, Efficient, and Real-Time Data Compaction Strategy for APT Forensic Analysis. IEEE Transactions on Information Forensics and Security, 16:3312-3325, 2021. (SCI 一区/CCF A)
A Payload Based Malicious HTTP Traffic Detection Method Using Transfer Semi-Supervised Learning. Applied Sciences-Basel, 11(16),2021. (SCI 二区)
WebSmell: An Efficient Malicious HTTP Traffic Detection Framework Using Data Augmentation. International Conference on Information Security and Cryptology,193-201, 2021. (CCF C)
TLSmell: Direct Identification on Malicious HTTPs Encryption Traffic with Simple Connection-Specific Indicators. Computer Systems Science and Engineering, 37(1):105-119, 2021. (SCI 一区)
A Collaborative Deep and Shallow Semisupervised Learning Framework for Mobile App Classification. Mobile Information Systems,2020. (SCI 四区)
A Risk Control Framework for Mortgaged Cars Based on Trajectory Mining.International Journal of Robotics & Automation,35(6):469-477,2020.
DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network. KSII Transactions on Internet and Information Systems,13(4):2180-2197,2019.
A Hybrid Deep Convolutional and Recurrent Neural Network for Complex Activity Recognition Using Multimodal Sensors. Neurocomputing, 362:33-40 (2019)
Discovering individual movement patterns from cell-id trajectory data by exploiting handoff features. Inf. Sci. 474: 18-32 (2019)
Urban Traffic Congestion Index Estimation With Open Ubiquitous Data. J. Inf. Sci. Eng. 34(3): 781-799 (2018)
TinyDroid: A Lightweight and Efficient Model for Android Malware Detection and Classification[J]. Mobile Information Systems, 2018:1-9.
Map matching based on Cell-ID localization for mobile phone users[J]. Cluster Computing, 2018(1):1-9.
Bi-View Semi-Supervised Learning Based Semantic Human Activity Recognition Using Accelerometers[J]. IEEE Transactions on Mobile Computing, 2018, 17(9):1991-2001.
Anti-chain based algorithms for timed/probabilistic refinement checking. Science China(Information Sciences) 61(5):052105,2018. (SCI)
Map matching based on Cell-ID localization for mobile phone users. Cluster Computing, 2018(1):1-9. (SCI)
From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security using PAT. Journal of Sensors, 2016, 520943:1-11. (SCI)
Efficient classification using parallel and scalable compressed model and its application on intrusion detection.Expert Systems with Applications, 2014, 41(13):5972-5983.
Formalizing and verifying stochastic system architectures using Monterey Phoenix. Software & Systems Modeling, 2014.(SCI)
Mystique: Evolving Android Malware for Auditing Anti-Malware Tools. AsiaCCS 2016.
混沌映射和神经网络互扰的新型复合流密码.物理学报,2013(SCI)
面向无线传感器网络的混沌加密与消息鉴别算法.通信学报, 2013.
自适应AP聚类算法及其在入侵检测中的应用.通信学报,2015.
Maldetect:基于Dalvik指令抽象的Android恶意代码检测系统.计算机研究与发展, 2016.
融合显性和隐性特征的中文微博情感分析. 中文信息学报, 2016, 30(4):184-192.
学术专著:无线传感器网络轻量级密码算法与协议,人民邮电出版社,ISBN:9787115323774.
专业教程:网络空间安全实战基础,人民邮电出版社,ISBN:9787115409805
一种基于Windows内核的事件日志采集方法及统,ZL202211061051.6,2022.08.31-2022.11.25,ipc:G06F9/54
一种多分类器自适应融合的HTTPS加密流量分类方法,ZL202110306256.5,2021.03.23-2022.07.15,ipc:H04L47/2441
一种WiFi物理隔离环境下的隐蔽文件传输方法,ZL201811188309.2,2018.10.12-2021.10.29,ipc:H04L29/08
一种基于Dalvik指令抽象的Android恶意代码检测方法,ZL201610266436.4,2016.11,09-2019.07.05. ipc:G06F21/56
基于云计算的数据挖掘REST服务平台ZL201510297442.1,2015.06.02-2019.1.22,ipc:H04L29/08
一种基于字节码图像聚类的Android恶意代码家族分类方法 ZL201610405003.2,2016.6.8-2018.9.18 ipc:G06F21/56
面向无线传感网安全协议设计与实现的形式化验证方法,ZL201410309197.7, 2014.07.01-2018.04.20. ipc:H04L12/26
一种隐含显性和隐性特征的中文微博情感分析方法. ZL201410723617.6,2014.12.03-2017.08.22 ipc:G06F17/30
一种基于混沌加密的互联网图片透明安全传输方法. ZL201310230863.3,2013.6.9-2016.12.28 ipc:H04L9/00
面向网页JavaScript恶意代码的智能检测方法ZL20102663296.5,2012.9.12-2015.1.7,ipc:G06F21/56
一种面向无线传感器网络的互扰复合混沌流密码实现方法ZL201210063524.6,2012.3.12-2014.12.27 ipc:H04L9/00
一种面向无线传感器网络的混沌消息认证码实现方法ZL201210063512.3,2012.3.12-2014.11.05 ipc:H04L9/00
一种融合神经网络与混沌映射的流密码密钥控制方法ZL201110135122.8,2011.5.24-2014.5.14 ipc:H04L9/08
基于Web Service的IBE密钥管理系统ZL201110135122.8,2009.11.10-2012.9.05 ipc:H04L9/32
一种动态口令安全登录方法ZL200810122071
基于神经网络权值同步的轻量级密钥协商方法ZL200710156220
国家标准:信息安全技术智能卡读写机具安全技术要求(EAL4增强),国家质量监督检验检疫总局,国家标准化管理委员会,GBT 35101-2017。