default search action
Jiangtao Zhai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j28]Zihang Hui, Jiangtao Zhai, Shengxian Wang, Weijie Ji:
A New Website Fingerprinting Method for Tor Hidden Service. IEEE Access 13: 8886-8897 (2025) - 2022
- [j27]Luhui Yang, Guangjie Liu, Jinwei Wang, Jiangtao Zhai, Yuewei Dai:
A semantic element representation model for malicious domain name detection. J. Inf. Secur. Appl. 66: 103148 (2022) - 2021
- [j26]Faiz Ul Islam, Guangjie Liu, Jiangtao Zhai, Weiwei Liu:
VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning. IEEE Access 9: 59783-59799 (2021) - [j25]Pengcheng Cao, Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Xiaopeng Ji, Yuewei Dai, Huiwen Bai:
Design a Wireless Covert Channel Based on Dither Analog Chaotic Code. Int. J. Digit. Crime Forensics 13(2): 115-133 (2021) - [j24]Luhui Yang, Guangjie Liu, Jinwei Wang, Huiwen Bai, Jiangtao Zhai, Yuewei Dai:
Fast3DS: A real-time full-convolutional malicious domain name detection system. J. Inf. Secur. Appl. 61: 102933 (2021) - [j23]Luhui Yang, Guangjie Liu, Weiwei Liu, Huiwen Bai, Jiangtao Zhai, Yuewei Dai:
Detecting Multielement Algorithmically Generated Domain Names Based on Adaptive Embedding Model. Secur. Commun. Networks 2021: 5567635:1-5567635:20 (2021) - 2020
- [j22]Wen Tian, Xiaopeng Ji, Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Yuewei Dai, Shuhua Huang:
Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid. IEEE Access 8: 64075-64085 (2020) - [j21]Luhui Yang, Guangjie Liu, Yuewei Dai, Jinwei Wang, Jiangtao Zhai:
Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework. IEEE Access 8: 82876-82889 (2020) - [j20]Jiangtao Zhai, Huaifeng Shi, Mingqian Wang, Zhongjun Sun, Junjun Xing:
An Encrypted Traffic Identification Scheme Based on the Multilevel Structure and Variational Automatic Encoder. Secur. Commun. Networks 2020: 8863169:1-8863169:10 (2020)
2010 – 2019
- 2019
- [j19]Qilin Yin, Jinwei Wang, Xiangyang Luo, Jiangtao Zhai, Sunil Kr. Jha, Yun-Qing Shi:
Quaternion Convolutional Neural Network for Color Image Classification and Forensics. IEEE Access 7: 20293-20301 (2019) - [j18]Hao Wang, Jinwei Wang, Jiangtao Zhai, Xiangyang Luo:
Detection of Triple JPEG Compressed Color Images. IEEE Access 7: 113094-113102 (2019) - [j17]Weiwei Liu, Guangjie Liu, Xiaopeng Ji, Jiangtao Zhai, Yuewei Dai:
Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices. KSII Trans. Internet Inf. Syst. 13(4): 1866-1883 (2019) - [j16]Yuewei Dai, Weiwei Liu, Guangjie Liu, Xiaopeng Ji, Jiangtao Zhai:
An end-to-end generative network for environmental sound-based covert communication. Multim. Tools Appl. 78(7): 8635-8653 (2019) - [j15]Luhui Yang, Jiangtao Zhai, Weiwei Liu, Xiaopeng Ji, Huiwen Bai, Guangjie Liu, Yuewei Dai:
Detecting Word-Based Algorithmically Generated Domains Using Semantic Analysis. Symmetry 11(2): 176 (2019) - 2018
- [j14]Weiwei Liu, Guangjie Liu, Xiaopeng Ji, Jiangtao Zhai, Yuewei Dai:
Sound Texture Generative Model Guided by a Lossless Mel-Frequency Convolutional Neural Network. IEEE Access 6: 48030-48041 (2018) - [j13]Pengcheng Cao, Weiwei Liu, Guangjie Liu, Xiaopeng Ji, Jiangtao Zhai, Yuewei Dai:
A Wireless Covert Channel Based on Constellation Shaping Modulation. Secur. Commun. Networks 2018: 1214681:1-1214681:15 (2018) - [j12]Weiwei Liu, Guangjie Liu, Yang Xia, Xiaopeng Ji, Jiangtao Zhai, Yuewei Dai:
Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking. Secur. Commun. Networks 2018: 5051270:1-5051270:16 (2018) - [c6]Jin Shi, Li Zhang, Shuijun Yin, Weiwei Liu, Jiangtao Zhai, Guangjie Liu, Yuewei Dai:
A Comprehensive Analysis of Interval Based Network Flow Watermarking. ICCCS (4) 2018: 72-84 - [c5]Chenpeng Ding, Jiangtao Zhai, Yuewei Dai:
An Improved ICS Honeypot Based on SNAP7 and IMUNES. ICCCS (1) 2018: 303-313 - [c4]Luhui Yang, Guangjie Liu, Jiangtao Zhai, Yuewei Dai, Zhaozhi Yan, Yuguang Zou, Wenchao Huang:
A Novel Detection Method for Word-Based DGA. ICCCS (2) 2018: 472-483 - 2017
- [c3]Hao Wang, Guangjie Liu, Weiwei Liu, Jiangtao Zhai, Yuewei Dai:
Detection of Jitterbug Covert Channel Based on Partial Entropy Test. ICCCS (2) 2017: 357-368 - 2016
- [j11]Hao Wang, Guangjie Liu, Jiangtao Zhai, Yuewei Dai:
Detection and Parameter Estimation for Jitterbug Covert Channel Based on Coefficient of Variation. KSII Trans. Internet Inf. Syst. 10(4): 1927-1943 (2016) - [j10]Lihua Zhang, Guangjie Liu, Weiwei Liu, Jiangtao Zhai, Yuewei Dai:
Novel Covert Timing Channels Implemented over Multiple Flows by Using Space-Time Trellis Codes. J. Inf. Hiding Multim. Signal Process. 7(5): 1041-1051 (2016) - [j9]Jiangtao Zhai, Fang Yang, Yuewei Dai, Mingqian Wang:
A Covert Timing Channel Based on DCT Domain of Inter Packet Delay Sequence. J. Inf. Hiding Multim. Signal Process. 7(6): 1222-1230 (2016) - [j8]Jiangtao Zhai, Mingqian Wang, Guangjie Liu, Yuewei Dai:
Detecting JitterBug covert timing channel with sparse embedding. Secur. Commun. Networks 9(11): 1509-1519 (2016) - [j7]Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Yuewei Dai, Dipak Ghosal:
Designing Analog Fountain Timing Channels: Undetectability, Robustness, and Model-Adaptation. IEEE Trans. Inf. Forensics Secur. 11(4): 677-690 (2016) - [c2]Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Yuewei Dai:
A Construction Scheme of Steganographic Codes Based on Matrix Unwrapping. ICCCS (1) 2016: 166-177 - 2015
- [j6]Jiangtao Zhai, Mingqian Wang, Guangjie Liu, Yuewei Dai:
SkyLen: a Skype-based length covert channel. J. Inf. Hiding Multim. Signal Process. 6(3): 473-481 (2015) - [j5]Lihua Zhang, Guangjie Liu, Jiangtao Zhai, Yuewei Dai:
Improving Reliability of Covert Timing Channel to Packet Loss. J. Inf. Hiding Multim. Signal Process. 6(3): 544-553 (2015) - [j4]Wen Tian, Jiangtao Zhai, Mingqian Wang:
SkyLen: a Simple covert timing channel based on Huffman encoding. J. Inf. Hiding Multim. Signal Process. 6(6): 1203-1214 (2015) - 2013
- [j3]Jiangtao Zhai, Guangjie Liu, Yuewei Dai:
An Improved Retransmission-based Network Steganography: Design and Detection. J. Networks 8(1): 182-188 (2013) - [j2]Jiangtao Zhai, Guangjie Liu, Yuewei Dai:
Detection of TCP covert channel based on Markov model. Telecommun. Syst. 54(3): 333-343 (2013) - 2012
- [j1]Guangjie Liu, Jiangtao Zhai, Yuewei Dai:
Network covert timing channel with distribution matching. Telecommun. Syst. 49(2): 199-205 (2012)
2000 – 2009
- 2003
- [c1]Wei Pan, Qiong Lin, Jianping Li, Huiyun Wang, Jiangtao Zhai:
Wavelet Lossy and Lossless Compression Techniques for Image. WAA 2003: 569-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-28 23:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint