default search action
Hua Wu 0004
Person information
- affiliation: Southeast University, School of Cyber Science and Engineering, Nanjing, China
Other persons with the same name
- Hua Wu — disambiguation page
- Hua Wu 0001 — Chinese Academy of Sciences, Institute of Geographic Sciences and Natural Resources Research, Beijing, China
- Hua Wu 0002 — North China Electric Power University, Beijing, China
- Hua Wu 0003 — Baidu Inc., Beijing, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Xiaoyan Hu, Di Li, Miao Li, Guang Cheng, Ruidong Li, Hua Wu:
AHDom: Algorithmically generated domain detection using attribute heterogeneous graph neural network. Comput. Networks 254: 110770 (2024) - [j17]Suyue Wang, Hua Wu, Guang Cheng, Xiaoyan Hu, Jing Ren:
SD-MDN-TM: A traceback and mitigation integrated mechanism against DDoS attacks with IP spoofing. Comput. Networks 254: 110793 (2024) - [j16]Hua Wu, Yujie Liu, Guang Cheng, Xiaoyan Hu:
RT-CBCH: Real-Time VPN Traffic Service Identification Based on Sampled Data in High-Speed Networks. IEEE Trans. Netw. Serv. Manag. 21(1): 88-107 (2024) - [c36]Hangyu Zhao, Hua Wu, Xuqiong Bian, Songtao Liu, Guang Cheng, Xiaoyan Hu, Zhiyi Tian:
Unveiling the Unseen: Video Recognition Attacks on Social Software. ACISP (2) 2024: 412-432 - [c35]Nan Hu, Hua Wu, Hangyu Zhao, Shanshan Ni, Guang Cheng:
Breaking Through the Diversity: Encrypted Video Identification Attack Based on QUIC Features. ESORICS (4) 2024: 166-186 - [c34]Yuanjie Zhao, Hua Wu, Liujinhan Chen, Songtao Liu, Guang Cheng, Xiaoyan Hu:
Identifying Video Resolution from Encrypted QUIC Streams in Segment-combined Transmission Scenarios. NOSSDAV 2024: 50-56 - 2023
- [j15]Hua Wu, Ziling Shao, Fuhao Yang, Guang Cheng, Xiaoyan Hu, Jing Ren, Wei Wang:
PD-CPS: A practical scheme for detecting covert port scans in high-speed networks. Comput. Networks 231: 109825 (2023) - [j14]Xiaoyan Hu, Zhuozhuo Shu, Zhongqi Tong, Guang Cheng, Ruidong Li, Hua Wu:
Fine-grained Ethereum behavior identification via encrypted traffic analysis with serialized backward inference. Comput. Networks 237: 110110 (2023) - [j13]Hua Wu, Weina Li, Xiying Chen, Guang Cheng, Xiaoyan Hu, Youqiong Zhuang:
Batch classifier with adaptive update for backbone traffic classification. Comput. Commun. 202: 57-72 (2023) - [j12]Xiaoyan Hu, Cheng Zhu, Guang Cheng, Ruidong Li, Hua Wu, Jian Gong:
A Deep Subdomain Adaptation Network With Attention Mechanism for Malware Variant Traffic Identification at an IoT Edge Gateway. IEEE Internet Things J. 10(5): 3814-3826 (2023) - [j11]Xiaoyan Hu, Weicheng Zhou, Jun Yin, Guang Cheng, Shen Yan, Hua Wu:
Towards verifiable and privacy-preserving account model on a consortium blockchain based on zk-SNARKs. Peer Peer Netw. Appl. 16(4): 1834-1851 (2023) - [j10]Xiaoyan Hu, Hao Chen, Miao Li, Guang Cheng, Ruidong Li, Hua Wu, Yali Yuan:
ReplaceDGA: BiLSTM-Based Adversarial DGA With High Anti-Detection Ability. IEEE Trans. Inf. Forensics Secur. 18: 4406-4421 (2023) - [j9]Xiaoyan Hu, Wenjie Gao, Guang Cheng, Ruidong Li, Yuyang Zhou, Hua Wu:
Toward Early and Accurate Network Intrusion Detection Using Graph Embedding. IEEE Trans. Inf. Forensics Secur. 18: 5817-5831 (2023) - [j8]Hua Wu, Ya Liu, Shanshan Ni, Guang Cheng, Xiaoyan Hu:
LossDetection: Real-Time Packet Loss Monitoring System for Sampled Traffic Data. IEEE Trans. Netw. Serv. Manag. 20(1): 30-45 (2023) - [j7]Ziling Shao, Tingzheng Chen, Guang Cheng, Xiaoyan Hu, Weina Li, Hua Wu:
AF-FDS: An Accurate, Fast, and Fine-Grained Detection Scheme for DDoS Attacks in High-Speed Networks With Asymmetric Routing. IEEE Trans. Netw. Serv. Manag. 20(4): 4964-4981 (2023) - [j6]Hua Wu, Xin Li, Gang Wang, Guang Cheng, Xiaoyan Hu:
Resolution Identification of Encrypted Video Streaming Based on HTTP/2 Features. ACM Trans. Multim. Comput. Commun. Appl. 19(2): 73:1-73:23 (2023) - [c33]Weiwei Zhu, Hua Wu, Jingwen Quan, Guang Cheng, Xiaoyan Hu:
Accurate Identification of Encrypted Videos in Asymmetric Routing Scenarios. APNOMS 2023: 310-313 - [c32]Xiaoyan Hu, Yuxin Shi, Guang Cheng, Ruidong Li, Hua Wu, Gang Wang:
Towards Early and Accurate IoT Device-Type Identification with Global Attention Mechanism. GLOBECOM 2023: 3445-3450 - [c31]Gang Wang, Hua Wu, Guang Cheng, Xiaoyan Hu, Yuxin Shi:
Website Fingerprinting with Packet Sampling: A More Realistic Approach in Real-World Networks. GLOBECOM 2023: 7103-7108 - [c30]Xiaoyan Hu, Boquan Lin, Guang Cheng, Ruidong Li, Hua Wu:
Detecting Cryptomining Traffic Over an Encrypted Proxy Based on K-S Test. ICC 2023: 3787-3792 - [c29]Xiaoyan Hu, Ning Li, Guang Cheng, Ruidong Li, Hua Wu:
A Novel Darknet Traffic Classification Method Based on Knowledge Graph with Dynamic Embedding Learning. ICC 2023: 3799-3804 - [c28]Shiyue Liu, Hua Wu, Guang Cheng, Xiaoyan Hu:
Real-Time Phishing Detection Based on URL Multi-Perspective Features: Aiming at the Real Web Environment. ICC 2023: 3811-3816 - [c27]Zhaoxu Ge, Hua Wu, Guang Cheng, Xiaoyan Hu:
NFlowGAN: High-Utility Privacy-Preserving Network Flow Synthesis Based on GAN. ICC 2023: 4057-4062 - [c26]Jinfeng Chen, Hua Wu, Suyue Wang, Guang Cheng, Xiaoyan Hu:
An Accurate and Real-Time Detection Method for Concealed Slow HTTP DoS in Backbone Network. SEC 2023: 207-221 - [c25]Anting Lu, Hua Wu, Hao Luo, Guang Cheng, Xiaoyan Hu:
Real-Time Platform Identification of VPN Video Streaming Based on Side-Channel Attack. SEC 2023: 335-349 - 2022
- [j5]Xiaoyan Hu, Xiaoyi Song, Guang Cheng, Hua Wu, Jian Gong:
Efficient sharing of privacy-preserving sensing data on consortium blockchain via group key agreement. Comput. Commun. 194: 44-54 (2022) - [j4]Xiaoyan Hu, Cheng Zhu, Zhongqi Tong, Wenjie Gao, Guang Cheng, Ruidong Li, Hua Wu, Jian Gong:
Identifying Ethereum traffic based on an active node library and DEVp2p features. Future Gener. Comput. Syst. 132: 162-177 (2022) - [c24]Hua Wu, Yuping Sui, Guang Cheng, Xiaoyan Hu, Qinghua Shang:
Service classification of high-speed network traffic based on Two-Stage Clustering. APNOMS 2022: 1-6 - [c23]Youqiong Zhuang, Hua Wu, Songtao Liu, Guang Cheng, Xiaoyan Hu:
HDS: A Hierarchical Scheme for Accurate and Efficient DDoS Flooding Attack Detection. APNOMS 2022: 1-6 - [c22]Xiaoyan Hu, Yishu Gao, Guang Cheng, Hua Wu, Ruidong Li:
An Adversarial Learning-based Tor Malware Traffic Detection Model. GLOBECOM 2022: 74-79 - [c21]Xiaoyan Hu, Yuelin Hu, Guang Cheng, Hua Wu, Yifei Qin, Jian Gong:
A Dynamic Access Control Model Based on Attributes and Intro VAE. GLOBECOM 2022: 1379-1384 - [c20]Hua Wu, Ziling Shao, Guang Cheng, Xiaoyan Hu, Jing Ren, Wei Wang:
Detecting Slow Port Scans of Long Duration in High-Speed Networks. GLOBECOM 2022: 3405-3410 - [c19]Xiaoyan Hu, Miao Li, Guang Cheng, Ruidong Li, Hua Wu, Jian Gong:
Towards Accurate DGA Detection based on Siamese Network with Insufficient Training Samples. ICC 2022: 2670-2675 - [c18]Hua Wu, Xuange Zhang, Tingzheng Chen, Guang Cheng, Xiaoyan Hu:
IM-Shield: A Novel Defense System against DDoS Attacks under IP Spoofing in High-speed Networks. ICC 2022: 4168-4173 - [c17]Hua Wu, Yujie Liu, Guang Cheng, Xiaoyan Hu:
Real-time Identification of VPN Traffic based on Counting Bloom Filter and Chained Hash Table from Sampled Data in High-speed Networks. ICC 2022: 5070-5075 - [c16]Hua Wu, Chengfei Zhu, Guang Cheng, Xiaoyan Hu:
Real-time Application Identification of RTC Media Streams via Encrypted Traffic Analysis. ICCCN 2022: 1-10 - [c15]Hua Wu, Chaoqun Cui, Guang Cheng, Xiaoyan Hu:
PSCM: Towards Practical Encrypted Unknown Protocol Classification. ISCC 2022: 1-6 - [c14]Hua Wu, Xingmeng Fan, Guang Cheng, Xiaoyan Hu:
Identify IoT Devices from Backbone Networks Using Lightweight Neural Networks. LCN 2022: 140-148 - [c13]Hua Wu, Rui Wang, Guang Cheng, Xiaoyan Hu:
Service-Based Identification of Highly Coupled Mobile Applications. LCN 2022: 279-282 - 2021
- [j3]Hua Wu, Qiuyan Wu, Guang Cheng, Shuyi Guo, Xiaoyan Hu, Shen Yan:
SFIM: Identify user behavior based on stable features. Peer-to-Peer Netw. Appl. 14(6): 3674-3687 (2021) - [c12]Hua Wu, Tingzheng Chen, Ziling Shao, Guang Cheng, Xiaoyan Hu:
Accurate and Fast Detection of DDoS Attacks in High-Speed Network with Asymmetric Routing. GLOBECOM 2021: 1-6 - [c11]Hua Wu, Lu Wang, Guang Cheng, Xiaoyan Hu:
Mobile Application Encryption Traffic Classification Based On TLS Flow Sequence Network. ICC Workshops 2021: 1-6 - [c10]Hua Wu, Xin Li, Guang Cheng, Xiaoyan Hu:
Monitoring Video Resolution of Adaptive Encrypted Video Traffic Based on HTTP/2 Features. INFOCOM Workshops 2021: 1-6 - [c9]Hua Wu, Ya Liu, Guang Cheng, Xiaoyan Hu:
Real-time Packet Loss Detection for TCP and UDP Based on Feature-Sketch. INFOCOM Workshops 2021: 1-6 - [c8]Hua Wu, Xiying Chen, Guang Cheng, Xiaoyan Hu, Youqiong Zhuang:
BCAC: Batch Classifier based on Agglomerative Clustering for traffic classification in a backbone network. IWQoS 2021: 1-10 - 2020
- [j2]Guang Cheng, Lixia Zhao, Xiaoyan Hu, Shaoqi Zheng, Hua Wu, Chengyu Fan:
A network-wide view-based detection and mitigation of a sophisticated Interest Flooding Attack. EURASIP J. Wirel. Commun. Netw. 2020(1): 144 (2020) - [c7]Hua Wu, Yu Gu, Guang Cheng, Yuyang Zhou:
Effectiveness Evaluation Method for Cyber Deception Based on Dynamic Bayesian Attack Graph. CSSE 2020: 1-9 - [c6]Hua Wu, Zhenhua Yu, Guang Cheng, Shuyi Guo:
Identification of Encrypted Video Streaming Based on Differential Fingerprints. INFOCOM Workshops 2020: 74-79 - [c5]Hua Wu, Qiuyan Wu, Guang Cheng, Shuyi Guo:
Instagram User Behavior Identification Based on Multidimensional Features. INFOCOM Workshops 2020: 1111-1116
2010 – 2019
- 2019
- [c4]Hua Wu, Guang Cheng, Xiaoyan Hu:
Inferring ADU Combinations from Encrypted QUIC Stream. CFI 2019: 4:1-4:6 - [c3]Guang Cheng, Lixia Zhao, Xiaoyan Hu, Shaoqi Zheng, Hua Wu, Ruidong Li, Chengyu Fan:
Detecting and Mitigating A Sophisticated Interest Flooding Attack in NDN from the Network-Wide View. NMIC@ICDCS 2019: 7-12 - 2012
- [c2]Guang Cheng, Hua Wu:
A NetFlow v9 Measurement System with Network Performance Function. IDCS 2012: 134-145
2000 – 2009
- 2009
- [c1]Hua Wu, Jian Gong:
Packet Loss Estimation of TCP Flows Based on the Delayed ACK Mechanism. APNOMS 2009: 540-543 - 2008
- [j1]Guang Cheng, Jian Gong, Wei Ding, Hua Wu, ShiQiang Qiang:
Adaptive sampling algorithm for detection of superpoints. Sci. China Ser. F Inf. Sci. 51(11): 1804-1821 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-18 20:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint