팔로우
Gaofeng He(何高峰)
제목
인용
인용
연도
A novel active website fingerprinting attack against Tor anonymous system
G He, M Yang, X Gu, J Luo, Y Ma
Proceedings of the 2014 IEEE 18th international conference on computer …, 2014
512014
A novel application classification attack against Tor
G He, M Yang, J Luo, X Gu
Concurrency and Computation: Practice and Experience 27 (18), 5640-5661, 2015
422015
Inferring application type information from tor encrypted traffic
G He, M Yang, J Luo, X Gu
2014 Second International Conference on Advanced Cloud and Big Data, 220-227, 2014
382014
Online identification of Tor anonymous communication traffic
何高峰, 杨明, 罗军舟, 张璐
Journal of Software 24 (3), 540-556, 2013
342013
Application-level attack against Tor's hidden service
L Zhang, J Luo, M Yang, G He
2011 6th International Conference on Pervasive Computing and Applications …, 2011
222011
AppFA: A Novel Approach to Detect Malicious Android Applications on the Network
G He, B Xu, H Zhu
Security and Communication Networks, 1-15, 2018
202018
基于时隙质心流水印的匿名通信追踪技术
张璐, 罗军舟, 杨明, 何高峰
软件学报 22 (10), 2358-2371, 2011
19*2011
ME-Box: A reliable method to detect malicious encrypted traffic
B Xu, G He, H Zhu
Journal of Information Security and Applications 59, 102823, 2021
172021
Spotting review spammer groups: A cosine pattern and network based method
L Zhang, G He, J Cao, H Zhu, B Xu
Concurrency and Computation: Practice and Experience, e4686, 2018
152018
A novel method to detect encrypted data exfiltration
G He, T Zhang, Y Ma, B Xu
2014 Second International Conference on Advanced Cloud and Big Data, 240-246, 2014
152014
Tor 匿名通信流量在线识别方法
何高峰, 杨明, 罗军舟, 张璐
软件学报 24 (3), 540-556, 2013
152013
On‐Device Detection of Repackaged Android Malware via Traffic Clustering
G He, B Xu, L Zhang, H Zhu
Security and Communication Networks 2020 (1), 8630748, 2020
122020
Mobile app identification for encrypted network flows by traffic correlation
G He, B Xu, L Zhang, H Zhu
International Journal of Distributed Sensor Networks 14 (12), 1550147718817292, 2018
122018
Identifying mobile applications for encrypted network traffic
G He, B Xu, H Zhu
2017 Fifth International Conference on Advanced Cloud and Big Data (CBD …, 2017
112017
A minimum defense cost calculation method for attack defense trees
B Xu, Z Zhong, G He
Security and Communication Networks 2020 (1), 8870734, 2020
82020
洋葱路由追踪技术中时间特征的建模与分析
何高峰, 杨明, 罗军舟, 张璐, 马媛媛
计算机学报 37 (002), 356-372, 2014
82014
Preventing iot ddos attacks using blockchain and ip address obfuscation
G He, Y Si, X Xiao, Q Wei, H Zhu, B Xu
2021 13th International Conference on Wireless Communications and Signal …, 2021
72021
SA Sketch: A self‐adaption sketch framework for high‐speed network
H Zhu, Y Zhang, L Zhang, G He, L Liu, N Liu
Concurrency and Computation: Practice and Experience, e5891, 2020
72020
Detecting repackaged android malware based on mobile edge computing
G He, L Zhang, B Xu, H Zhu
2018 Sixth International Conference on Advanced Cloud and Big Data (CBD …, 2018
72018
CBFSketch: A scalable sketch framework for high speed network
H Zhu, Y Zhang, L Zhang, G He, L Liu
2019 Seventh International Conference on Advanced Cloud and Big Data (CBD …, 2019
62019
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20