default search action
Yafei Sang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j3]Xiang Li, Jiang Xie, Qige Song, Yafei Sang, Yongzheng Zhang, Shuhao Li, Tianning Zang:
Let model keep evolving: Incremental learning for encrypted traffic classification. Comput. Secur. 137: 103624 (2024) - [j2]Qige Song, Yafei Sang, Yongzheng Zhang, Shuhao Li, Xiaolin Xu:
SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification. IEEE Trans. Inf. Forensics Secur. 19: 1372-1387 (2024) - 2023
- [j1]Yafei Sang, Jisong Yang, Yongzheng Zhang, Shuhao Li, Peng Chang:
Toward IoT device fingerprinting from proprietary protocol traffic via key-blocks aware approach. Comput. Secur. 131: 103145 (2023) - [c22]Ziang Li, Yafei Sang, Zhenyu Cheng, Tianning Zang, Shuyuan Zhao, Han Wang:
TCCN: A Network Traffic Classification and Detection Model Based on Capsule Network. ICC 2023: 2319-2324 - [c21]Xiang Li, Juncheng Guo, Qige Song, Jiang Xie, Yafei Sang, Shuyuan Zhao, Yongzheng Zhang:
Listen to Minority: Encrypted Traffic Classification for Class Imbalance with Contrastive Pre-Training. SECON 2023: 447-455 - [i1]Xiang Li, Juncheng Guo, Qige Song, Jiang Xie, Yafei Sang, Shuyuan Zhao, Yongzheng Zhang:
Listen to Minority: Encrypted Traffic Classification for Class Imbalance with Contrastive Pre-Training. CoRR abs/2308.16453 (2023) - 2022
- [c20]Zhefeng Nan, Changbo Tian, Yafei Sang, Guangze Zhao:
ACS: An Efficient Messaging System with Strong Tracking-Resistance. CollaborateCom (2) 2022: 55-74 - [c19]Hanwu Sun, Chengwei Peng, Yafei Sang, Shuhao Li, Yongzheng Zhang, Yujia Zhu:
Evading Encrypted Traffic Classifiers by Transferable Adversarial Traffic. CollaborateCom (2) 2022: 153-173 - [c18]Jingrun Ma, Yafei Sang, Yongzheng Zhang, Xiaolin Xu, Beibei Feng, Yuwei Zeng:
An Adaptive Ensembled Neural Network-Based Approach to IoT Device Identification. CollaborateCom (2) 2022: 214-230 - [c17]Binglai Wang, Yafei Sang, Yongzheng Zhang, Shuhao Li, Ruihai Ge, Yong Ding:
A Longitudinal Measurement and Analysis of Pink, a Hybrid P2P IoT Botnet. CollaborateCom (2) 2022: 419-436 - [c16]Binglai Wang, Yafei Sang, Yongzheng Zhang, Shuhao Li, Xiaolin Xu:
A longitudinal Measurement and Analysis Study of Mozi, an Evolving P2P IoT Botnet. TrustCom 2022: 117-122 - 2021
- [c15]Jisong Yang, Yafei Sang, Yongzheng Zhang, Peng Chang, Chengwei Peng:
Exploiting Heterogeneous Information for IoT Device Identification Using Graph Convolutional Network. CollaborateCom (1) 2021: 575-591 - [c14]Juncheng Guo, Yafei Sang, Peng Chang, Xiaolin Xu, Yongzheng Zhang:
MGEL: A Robust Malware Encrypted Traffic Detection Method Based on Ensemble Learning with Multi-grained Features. ICCS (2) 2021: 195-208 - 2020
- [c13]Yafei Sang, Mao Tian, Yongzheng Zhang, Peng Chang, Shuyuan Zhao:
IncreAIBMF: Incremental Learning for Encrypted Mobile Application Identification. ICA3PP (3) 2020: 494-508 - [c12]Binglai Wang, Yu Dou, Yafei Sang, Yongzheng Zhang, Ji Huang:
IoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware. ICC 2020: 1-7 - [c11]Yafei Sang, Yan Xu, Yongzheng Zhang, Peng Chang, Shuyuan Zhao, Yijing Wang:
Toward Automatic Mobile Application Fingerprint Extraction from Non-encrypted HTTP Traffic. ISPA/BDCloud/SocialCom/SustainCom 2020: 353-362
2010 – 2019
- 2019
- [c10]Yongzheng Zhang, Shuyuan Zhao, Yafei Sang:
Towards Unknown Traffic Identification Using Deep Auto-Encoder and Constrained Clustering. ICCS (1) 2019: 309-322 - [c9]Mao Tian, Peng Chang, Yafei Sang, Yongzheng Zhang, Shuhao Li:
Mobile Application Identification Over HTTPS Traffic Based on Multi-view Features. ICT 2019: 73-79 - [c8]Shuyuan Zhao, Yongzheng Zhang, Yafei Sang:
Towards Unknown Traffic Identification via Embeddings and Deep Autoencoders. ICT 2019: 85-89 - 2017
- [c7]Yafei Sang, Yongzheng Zhang, Chengwei Peng:
ProNet: Toward Payload-Driven Protocol Fingerprinting via Convolutions and Embeddings. CollaborateCom 2017: 519-529 - [c6]Yafei Sang, Yongzheng Zhang:
Fingerprinting Protocol at Bit-Level Granularity: A Graph-Based Approach Using Cell Embedding. ICPADS 2017: 266-275 - [c5]Zhenyu Cheng, Xunxun Chen, Yongzheng Zhang, Shuhao Li, Yafei Sang:
Detecting Information Theft Based on Mobile Network Flows for Android Users. NAS 2017: 1-10 - [c4]Jian Xu, Xiaochun Yun, Yongzheng Zhang, Yafei Sang, Zhenyu Cheng:
NetworkTrace: Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis. TrustCom/BigDataSE/ICESS 2017: 691-698 - 2016
- [c3]Yafei Sang, Shicong Li, Yongzheng Zhang, Tao Xu:
ProDigger: Towards Robust Automatic Network Protocol Fingerprint Learning via Byte Embedding. Trustcom/BigDataSE/ISPA 2016: 284-291 - [c2]Yandong Han, Zhiyu Hao, Lei Cui, Chonghua Wang, Yafei Sang:
A Hybrid Monitoring Mechanism in Virtualized Environments. Trustcom/BigDataSE/ISPA 2016: 1038-1045 - 2014
- [c1]Yafei Sang, Yongzheng Zhang, Yipeng Wang, Yu Zhou, Xu Tao:
A Segmentation Pattern Based Approach to Automated Protocol Identification. PDCAT 2014: 7-12
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint