Portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 2
Published in TrustCom/BigDataSE 2018, 2018
Recommended citation: Liya Su, Yepeng Yao, Ning Li, Junrong Liu, Zhigang Lu, Baoxu Liu. Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection[C]//2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2018: 744-753. https://ieeexplore.ieee.org/document/8455976
Published in Milcom IEEE, 2018
Recommended citation: Yepeng Yao, Liya Su, Zhigang Lu: DeepGFL: Deep Feature Learning via Graph for Attack Detection on Flow-based Network Traffic[C]//2018 Milcom. IEEE, 2018: 579-584. https://ieeexplore.ieee.org/document/8599821
Published in ICCS Springer, 2019
Recommended citation: Yepeng Yao, Liya Su, Chen Zhang, Zhigang Lu, Baoxu Liu. Marrying Graph Kernel with Deep Neural Network: A Case Study for Network Anomaly Detection[C]//2019 International Conference on Computational Science. Springer, Cham, 2019: 102-115. https://link.springer.com/chapter/10.1007/978-3-030-22741-8_8
Published in TrustCom/BigDataSE IEEE, 2019
Recommended citation: Yepeng Yao, Liya Su, Zhigang Lu, Baoxu Liu. STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection[C]//2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2019: 120-127. https://ieeexplore.ieee.org/document/8887381
Published in TrustCom/BigDataSE IEEE, 2019
Recommended citation: Liya Su, Yepeng Yao, Zhigang Lu, Baoxu Liu: Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-Based Network Attack Detection[C]//2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2019: 312-318. https://ieeexplore.ieee.org/abstract/document/8887382
Published in Security & Privacy, 2021
Recommended citation: Chen Y, Yao Y, Wang X F, et al. Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis[C]. Security & Privacy, 2021. https://www.computer.org/csdl/pds/api/csdl/proceedings/download-article/1t0x9Hqia1G/pdf
Published:
Coming soon.
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.