Follow
Yipeng Wang
Yipeng Wang
College of Computer Science, Beijing University of Technology
Verified email at bjut.edu.cn
Title
Cited by
Cited by
Year
A semantics aware approach to automated reverse engineering unknown protocols
Y Wang, X Yun, MZ Shafiq, L Wang, AX Liu, Z Zhang, D Yao, Y Zhang, ...
2012 20th IEEE International Conference on Network Protocols (ICNP), 1-10, 2012
1872012
Inferring protocol state machine from network traces: a probabilistic approach
Y Wang, Z Zhang, D Yao, B Qu, L Guo
Applied Cryptography and Network Security: 9th International Conference …, 2011
1352011
A Semantics-Aware Approach to the Automated Network Protocol Identification
X Yun, Y Wang, Y Zhang, Y Zhou
IEEE/ACM Transactions on Networking 24 (1), 583 - 595, 2016
962016
Biprominer: Automatic mining of binary protocol features
Y Wang, X Li, J Meng, Y Zhao, Z Zhang, L Guo
2011 12th International Conference on Parallel and Distributed Computing …, 2011
582011
Update vs. upgrade: Modeling with indeterminate multi-class active learning
XY Zhang, S Wang, X Zhu, X Yun, G Wu, Y Wang
Neurocomputing 162, 163-170, 2015
462015
Khaos: An Adversarial Neural Network DGA with High Anti-Detection Ability
X Yun, J Huang, Y Wang, T Zang, Y Zhou, Y Zhang
IEEE Transactions on Information Forensics and Security 15, 2225-2240, 2020
452020
Joint character-level word embedding and adversarial stability training to defend adversarial text
H Liu, Y Zhang, Y Wang, Z Lin, Y Chen
Proceedings of the AAAI conference on artificial intelligence 34 (05), 8384-8391, 2020
442020
Identifying malicious nodes in wireless sensor networks based on correlation detection
Y Lai, L Tong, J Liu, Y Wang, T Tang, Z Zhao, H Qin
Computers & Security 113, 102540, 2022
412022
Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach
Y Chen, T Zang, Y Zhang, Y Zhou, Y Wang
2019 IEEE 27th International Conference on Network Protocols (ICNP), 1-11, 2019
362019
Visual similarity based anti-phishing with the combination of local and global features
Y Zhou, Y Zhang, J Xiao, Y Wang, W Lin
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
352014
Using entropy to classify traffic more deeply
Y Wang, Z Zhang, L Guo, S Li
2011 IEEE Sixth International Conference on Networking, Architecture, and …, 2011
332011
Unified graph embedding-based anomalous edge detection
L Ouyang, Y Zhang, Y Wang
2020 International Joint Conference on Neural Networks (IJCNN), 1-8, 2020
252020
A comprehensive measurement study of domain-squatting abuse
Y Zeng, T Zang, Y Zhang, X Chen, Y Wang
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019
222019
Detecting Domain Generation Algorithms with Convolutional Neural Language Models
J Huang, P Wang, T Zang, Q Qiang, Y Wang, M Yu
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
212018
DEIDS: a novel intrusion detection system for industrial control systems
H Gu, Y Lai, Y Wang, J Liu, M Sun, B Mao
Neural Computing and Applications 34 (12), 9793-9811, 2022
182022
A Few-shot Learning Based Approach to IoT Traffic Classification
Z Zhao, Y Lai, Y Wang, W Jia, H He
IEEE Communications Letters 26 (3), 537-541, 2022
172022
A Multi-scale Feature Attention Approach to Network Traffic Classification and Its Model Explanation
Y Wang, X Yun, Y Zhang, C Zhao, X Liu
IEEE Transactions on Network and Service Management 19 (2), 875 - 889, 2022
162022
Rethinking Robust and Accurate Application Protocol Identification
Yipeng Wang, Xiaochun Yun, Yongzheng Zhang, Liwei Chen, Tianning Zang
Computer Networks 129 (P1), 64-78, 2017
162017
Intrusion Detection System Based on In-depth Understandings of Industrial Control Logic
M Sun, Y Lai, Y Wang, J Liu, B Mao, H Gu
IEEE Transactions on Industrial Informatics 19 (3), 2295-2306, 2023
152023
A cascade forest approach to application classification of mobile traces
Y Liu, S Zhang, B Ding, X Li, Y Wang
IEEE Wireless Communications and Networking Conference, 1-6, 2018
142018
The system can't perform the operation now. Try again later.
Articles 1–20