default search action
Tianning Zang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Xiang Li, Jiang Xie, Qige Song, Yafei Sang, Yongzheng Zhang, Shuhao Li, Tianning Zang:
Let model keep evolving: Incremental learning for encrypted traffic classification. Comput. Secur. 137: 103624 (2024) - [c40]Tianye Gao, Wang Qi, Kehong Liu, Shengbao Li, Ruihai Ge, Tianning Zang:
MTS-IoT: A Robust Encrypted IoT Traffic Classification via Multi-dimensional Time Series. CSCWD 2024: 323-328 - [c39]Ziang Li, Jie Xu, Zhenyu Cheng, Tianning Zang:
IMTCDF: A Multi-Module-Based Internet Malicious Traffic Classification and Detection Framework. CSCWD 2024: 582-587 - [c38]Kehong Liu, Qi Wang, Tianye Gao, Tianxing Ma, Tianning Zang:
A Machine Learning-based Method for Clustering the Traffic of Linux NATed Network Entities with TCP/IP Feature. CSCWD 2024: 1010-1016 - [c37]Wenxuan Lu, Zhuohang Lv, Lanqi Yang, Xiang Luo, Tianning Zang:
Efficiently Adapting Traffic Pre-trained Models for Encrypted Traffic Classification. CSCWD 2024: 2828-2833 - [c36]Kehong Liu, Qi Wang, Junnan Yin, Letian Du, Tianning Zang:
Revisiting Open DNS Resolver Vulnerabilities to Reflection-Based DDoS Threats. CSCWD 2024: 3158-3163 - [c35]Wenxuan Lu, Songhao Jiang, Yijing Wang, Tianning Zang:
Hit the Nail on the Head: Parameter-Efficient Multi-task Tuning via Human Language Intervention. EMNLP (Findings) 2024: 8873-8885 - [c34]Weiguang Wang, Qi Wang, Tianning Zang, Xiaoyu Zhang, Lu Liu, Taorui Yang, Yijing Wang:
BotRGA: Neighborhood-Aware Twitter Bot Detection with Relational Graph Aggregation. ICCS (7) 2024: 162-176 - [c33]Shengbao Li, Zhuohang Lv, Tianning Zang, Lanqi Yang, Qian Qiang:
AppFineGraph: Hierarchical Mobile Encrypted Traffic Classification at Multi-Granularities via a Branch Graph Neural Network. IJCNN 2024: 1-8 - [c32]Songhao Jiang, Yan Chu, Tianxing Ma, Xiaochen Miao, Zhengkui Wang, Tianning Zang:
Vicinal Data Augmentation for Classification Model via Feature Weaken. KSEM (1) 2024: 334-346 - [c31]Tianxing Ma, Yueyue Hu, Shuang Jiang, Zhenhao Yin, Tianning Zang:
Multilingual Temporal Answer Grounding in Video Corpus with Enhanced Visual-Textual Integration. NLPCC (5) 2024: 471-483 - [c30]Shengbao Li, Qian Qiang, Tianning Zang, Lanqi Yang, Tianye Gao:
FineNet: Few-Shot Mobile Encrypted Traffic Classification via a Deep Triplet Learning Network Based on Transformer. WCNC 2024: 1-6 - 2023
- [c29]Jingrun Ma, Xiaolin Xu, Tianning Zang, Xi Wang, Beibei Feng, Xiang Li:
A Semi-supervised Learning Method for Malware Traffic Classification with Raw Bitmaps. CollaborateCom (2) 2023: 341-356 - [c28]Ziang Li, Yafei Sang, Zhenyu Cheng, Tianning Zang, Shuyuan Zhao, Han Wang:
TCCN: A Network Traffic Classification and Detection Model Based on Capsule Network. ICC 2023: 2319-2324 - [c27]Songhao Jiang, Yan Chu, Zhengkui Wang, Tianxing Ma, Hanlin Wang, Wenxuan Lu, Tianning Zang, Bo Wang:
Explainable Text Classification via Attentive and Targeted Mixing Data Augmentation. IJCAI 2023: 5085-5094 - [c26]Ziang Li, Zhenyu Cheng, Tianning Zang, Yijie Li:
MTCD-Model: A Two-Layer Model for Malicious Traffic Classification and Detection Based on Hierarchical Feature Learning. IJCNN 2023: 1-8 - [c25]Xiang Li, Beibei Feng, Tianning Zang, Xiaolin Xu, Shuyuan Zhao, Jingrun Ma:
Facing Unknown: Open-World Encrypted Traffic Classification Based on Contrastive Pre-Training. ISCC 2023: 1255-1260 - [c24]Haiping Wang, Binbin Li, Tianning Zang, Yifei Yang, Zisen Qi, Siyu Jia, Yu Ding:
Real-Time Aggregation for Massive Alerts Based on Dynamic Attack Granularity Graph. SciSec 2023: 225-243 - [c23]Zhefeng Nan, Qian Qiang, Tianning Zang, Changbo Tian, Shuyuan Zhao, Shuhe Liu:
Topology construction method of anti-tracking network based on cross-domain decentralized gravity model. TrustCom 2023: 512-521 - [i2]Xiang Li, Beibei Feng, Tianning Zang, Shuyuan Zhao, Jingrun Ma:
Facing Unknown: Open-World Encrypted Traffic Classification Based on Contrastive Pre-Training. CoRR abs/2308.16861 (2023) - 2022
- [j5]Yuwei Zeng, Zhicheng Liu, Xunxun Chen, Tianning Zang:
Hidden Path: Understanding the Intermediary in Malicious Redirections. IEEE Trans. Inf. Forensics Secur. 17: 1725-1740 (2022) - [c22]Jian Han, Zhonghua Wang, Songhao Jiang, Tianning Zang:
Malicious Blockchain Domain Detection Based on Heterogeneous Information Network. GLOBECOM 2022: 2597-2602 - [c21]Qian Qiang, Yige Chen, Yang Hu, Tianning Zang, Mian Cheng, Quanbo Pan, Yu Ding, Zisen Qi:
Cost-Effective Malware Classification Based on Deep Active Learning. SecureComm 2022: 212-227 - [i1]Songhao Jiang, Yan Chu, Tianxing Ma, Tianning Zang:
Feature Weaken: Vicinal Data Augmentation for Classification. CoRR abs/2211.10944 (2022) - 2021
- [j4]Yuwei Zeng, Xiaochun Yun, Xunxun Chen, Boquan Li, Haiwei Tsang, Yipeng Wang, Tianning Zang, Yongzheng Zhang:
Finding disposable domain names: A linguistics-based stacking approach. Comput. Networks 184: 107642 (2021) - [c20]Yige Chen, Tianning Zang, Yongzheng Zhang, Yuan Zhou, Peng Yang:
Mobile Encrypted Traffic Classification Based on Message Type Inference. CollaborateCom (1) 2021: 117-137 - [c19]Yige Chen, Tianning Zang, Yongzheng Zhang, Yuan Zhou, Peng Yang, Yipeng Wang:
Inspector: A Semantics-Driven Approach to Automatic Protocol Reverse Engineering. CollaborateCom (1) 2021: 348-367 - [c18]Yige Chen, Tianning Zang, Yongzheng Zhang, Yuan Zhou, Linshu Ouyang, Peng Yang:
Incremental Learning for Mobile Encrypted Traffic Classification. ICC 2021: 1-6 - [c17]Yuwei Zeng, Xunxun Chen, Tianning Zang, Haiwei Tsang:
Winding Path: Characterizing the Malicious Redirection in Squatting Domain Names. PAM 2021: 93-107 - 2020
- [j3]Xiaochun Yun, Ji Huang, Yipeng Wang, Tianning Zang, Yuan Zhou, Yongzheng Zhang:
Khaos: An Adversarial Neural Network DGA With High Anti-Detection Ability. IEEE Trans. Inf. Forensics Secur. 15: 2225-2240 (2020) - [c16]Chen Zhao, Yongzheng Zhang, Tianning Zang, Yige Chen, Yipeng Wang:
A Multi-feature-based Approach to Malicious Domain Name Identification from DNS Traffic. ICT 2020: 1-5 - [c15]Zhangrong Huang, Ji Huang, Tianning Zang:
Leopard: Understanding the Threat of Blockchain Domain Name Based Malware. PAM 2020: 55-70 - [c14]Zhizhou Liang, Tianning Zang, Yuwei Zeng:
MalPortrait: Sketch Malicious Domain Portraits Based on Passive DNS Data. WCNC 2020: 1-8
2010 – 2019
- 2019
- [c13]Dunsheng Yuan, Ying Xiong, Tianning Zang, Ji Huang:
Nemesis: Detecting Algorithmically Generated Domains with an LSTM Language Model. CollaborateCom 2019: 350-363 - [c12]Dingkui Yan, Huilin Zhang, Yipeng Wang, Tianning Zang, Xiaolin Xu, Yuwei Zeng:
Pontus: A Linguistics-Based DGA Detection System. GLOBECOM 2019: 1-6 - [c11]Yuwei Zeng, Tianning Zang, Yongzheng Zhang, Xunxun Chen, Yipeng Wang:
A Comprehensive Measurement Study of Domain-Squatting Abuse. ICC 2019: 1-6 - [c10]Yige Chen, Tianning Zang, Yongzheng Zhang, Yuan Zhou, Yipeng Wang:
Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach. ICNP 2019: 1-11 - [c9]Yuwei Zeng, Yongzheng Zhang, Tianning Zang, Xunxun Chen, Yipeng Wang:
A Linguistics-based Stacking Approach to Disposable Domains Detection. ICNP 2019: 1-4 - [c8]Chaoyi Zheng, Qian Qiang, Tianning Zang, Wenhan Chao, Yuan Zhou:
Themis: A Novel Detection Approach for Detecting Mixed Algorithmically Generated Domains. MSN 2019: 259-264 - 2018
- [j2]Miao Yu, Yongzheng Zhang, Tianning Zang, Yipeng Wang, Yijing Wang:
Information Propagation Prediction Based on Key Users Authentication in Microblogging. Secur. Commun. Networks 2018: 7024842:1-7024842:7 (2018) - [c7]Chen Zhao, Yongzheng Zhang, Tianning Zang, Zhizhou Liang, Yipeng Wang:
A Stacking Approach to Objectionable-Related Domain Names Identification by Passive DNS Traffic (Short Paper). CollaborateCom 2018: 284-294 - [c6]Wenbo Wang, Tianning Zang, Yuqing Lan:
The Rapid Extraction of Suspicious Traffic from Passive DNS. ICISSP 2018: 190-198 - [c5]Ji Huang, Pei Wang, Tianning Zang, Qian Qiang, Yipeng Wang, Miao Yu:
Detecting Domain Generation Algorithms with Convolutional Neural Language Models. TrustCom/BigDataSE 2018: 1360-1367 - 2017
- [j1]Yipeng Wang, Xiaochun Yun, Yongzheng Zhang, Liwei Chen, Tianning Zang:
Rethinking robust and accurate application protocol identification. Comput. Networks 129: 64-78 (2017) - 2014
- [c4]Lulu Zhang, Yongzheng Zhang, Tianning Zang:
Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-Coupled Payloads Filtering Scheme. SecureComm (1) 2014: 454-462 - 2011
- [c3]Xiang Cui, Binxing Fang, Lihua Yin, Xiaoyi Liu, Tianning Zang:
Andbot: Towards Advanced Mobile Botnets. LEET 2011 - 2010
- [c2]Tianning Zang, Xiao-chun Yun, Tianyi Zang, Yongzheng Zhang, Chaoguang Men:
Cooperative Work Systems for the Security of Digital Computing Infrastructure. ICPADS 2010: 676-681
2000 – 2009
- 2008
- [c1]Tianning Zang, Xiao-chun Yun, Yongzheng Zhang:
A Survey of Alert Fusion Techniques for Security Incident. WAIM 2008: 475-481
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint