About Me Yepeng Yao
Hi! I am a 4rd year student of Ph.D. candidate Cyberspace Security at University of Chinese Academy of Sciences, China.
Research Interest
- Network Data Security
- Web Security
- Graph-Theoretic and its Application to Information Security
- Smart Contract
Publications
- Liya Su, Yepeng Yao, Ning Li, Junrong Liu, Zhigang Lu, Baoxu Liu. Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection[C]//2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2018: 744-753. paper
- Yepeng Yao, Liya Su, Zhigang Lu: DeepGFL: Deep Feature Learning via Graph for Attack Detection on Flow-based Network Traffic[C]//2018 Milcom. IEEE, 2018: 579-584.
- Liya Su, Yepeng Yao, Zhigang Lu, Baoxu Liu: Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-Based Network Attack Detection[C]//2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2019: 312-318.
- Yepeng Yao, Liya Su, Chen Zhang, Zhigang Lu, Baoxu Liu. Marrying Graph Kernel with Deep Neural Network: A Case Study for Network Anomaly Detection[C]//2019 International Conference on Computational Science. Springer, Cham, 2019: 102-115.
- Yepeng Yao, Liya Su, Zhigang Lu, Baoxu Liu. STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection[C]//2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2019: 120-127.
- Qiang Li, Yunan Zhang, Liya Su, Yang Wu, Xinjian Ma, Zeming Yang. “An improved method to unveil malware’s hidden behavior” [C]// 2017 International Conference on Information Security and Cryptology. Springer, Cham, 2017: 362-382.
- Mingyi Chen, Yepeng Yao, Junrong Liu, Bo Jiang, Liya Su, Zhigang Lu. “A Novel Approach for Identifying Lateral Movement Attacks Based on Network Embedding”[C]//2018 ISPA
Achievements and Qualifications
- Won the 11th on Big Data and Computing Intelligence Contest hold by Institute of Computing Technology 2017
- Won the 23rd on Alibaba Tianchi Security algorithm Competition 2017
Education
Year | Institute | Major | State |
---|
2016.09 – current | University of Chinese Academy of Sciences (Beijing, China) | Cyberspace Security | PhD. Candidate |
2012.09 – 2016.06 | University of Science and Technology of China (Hefei, China) | Information Security in Computer Science | Graduate |
Skills
- Skill 1
- Skill 2
- Sub-skill 2.1
- Sub-skill 2.2
- Sub-skill 2.3
- Skill 3
Publications
Liya Su, Yepeng Yao, Ning Li, Junrong Liu, Zhigang Lu, Baoxu Liu. Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection[C]//2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2018: 744-753.
Yepeng Yao, Liya Su, Zhigang Lu: DeepGFL: Deep Feature Learning via Graph for Attack Detection on Flow-based Network Traffic[C]//2018 Milcom. IEEE, 2018: 579-584.
Yepeng Yao, Liya Su, Chen Zhang, Zhigang Lu, Baoxu Liu. Marrying Graph Kernel with Deep Neural Network: A Case Study for Network Anomaly Detection[C]//2019 International Conference on Computational Science. Springer, Cham, 2019: 102-115.
Yepeng Yao, Liya Su, Zhigang Lu, Baoxu Liu. STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection[C]//2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2019: 120-127.
Liya Su, Yepeng Yao, Zhigang Lu, Baoxu Liu: Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-Based Network Attack Detection[C]//2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2019: 312-318.
Chen Y, Yao Y, Wang X F, et al. Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis[C]. Security & Privacy, 2021.
Talks
August 01, 2021
Talk at USENIX Security 2021, Online
Teaching
Service and leadership
- Currently signed in to 43 different slack teams