A novel active website fingerprinting attack against Tor anonymous system G He, M Yang, X Gu, J Luo, Y Ma Proceedings of the 2014 IEEE 18th international conference on computer …, 2014 | 51 | 2014 |
A novel application classification attack against Tor G He, M Yang, J Luo, X Gu Concurrency and Computation: Practice and Experience 27 (18), 5640-5661, 2015 | 42 | 2015 |
Inferring application type information from tor encrypted traffic G He, M Yang, J Luo, X Gu 2014 Second International Conference on Advanced Cloud and Big Data, 220-227, 2014 | 38 | 2014 |
Online identification of Tor anonymous communication traffic 何高峰, 杨明, 罗军舟, 张璐 Journal of Software 24 (3), 540-556, 2013 | 34 | 2013 |
Application-level attack against Tor's hidden service L Zhang, J Luo, M Yang, G He 2011 6th International Conference on Pervasive Computing and Applications …, 2011 | 22 | 2011 |
AppFA: A Novel Approach to Detect Malicious Android Applications on the Network G He, B Xu, H Zhu Security and Communication Networks, 1-15, 2018 | 20 | 2018 |
基于时隙质心流水印的匿名通信追踪技术 张璐, 罗军舟, 杨明, 何高峰 软件学报 22 (10), 2358-2371, 2011 | 19* | 2011 |
ME-Box: A reliable method to detect malicious encrypted traffic B Xu, G He, H Zhu Journal of Information Security and Applications 59, 102823, 2021 | 17 | 2021 |
Spotting review spammer groups: A cosine pattern and network based method L Zhang, G He, J Cao, H Zhu, B Xu Concurrency and Computation: Practice and Experience, e4686, 2018 | 15 | 2018 |
A novel method to detect encrypted data exfiltration G He, T Zhang, Y Ma, B Xu 2014 Second International Conference on Advanced Cloud and Big Data, 240-246, 2014 | 15 | 2014 |
Tor 匿名通信流量在线识别方法 何高峰, 杨明, 罗军舟, 张璐 软件学报 24 (3), 540-556, 2013 | 15 | 2013 |
On‐Device Detection of Repackaged Android Malware via Traffic Clustering G He, B Xu, L Zhang, H Zhu Security and Communication Networks 2020 (1), 8630748, 2020 | 12 | 2020 |
Mobile app identification for encrypted network flows by traffic correlation G He, B Xu, L Zhang, H Zhu International Journal of Distributed Sensor Networks 14 (12), 1550147718817292, 2018 | 12 | 2018 |
Identifying mobile applications for encrypted network traffic G He, B Xu, H Zhu 2017 Fifth International Conference on Advanced Cloud and Big Data (CBD …, 2017 | 11 | 2017 |
A minimum defense cost calculation method for attack defense trees B Xu, Z Zhong, G He Security and Communication Networks 2020 (1), 8870734, 2020 | 8 | 2020 |
洋葱路由追踪技术中时间特征的建模与分析 何高峰, 杨明, 罗军舟, 张璐, 马媛媛 计算机学报 37 (002), 356-372, 2014 | 8 | 2014 |
Preventing iot ddos attacks using blockchain and ip address obfuscation G He, Y Si, X Xiao, Q Wei, H Zhu, B Xu 2021 13th International Conference on Wireless Communications and Signal …, 2021 | 7 | 2021 |
SA Sketch: A self‐adaption sketch framework for high‐speed network H Zhu, Y Zhang, L Zhang, G He, L Liu, N Liu Concurrency and Computation: Practice and Experience, e5891, 2020 | 7 | 2020 |
Detecting repackaged android malware based on mobile edge computing G He, L Zhang, B Xu, H Zhu 2018 Sixth International Conference on Advanced Cloud and Big Data (CBD …, 2018 | 7 | 2018 |
CBFSketch: A scalable sketch framework for high speed network H Zhu, Y Zhang, L Zhang, G He, L Liu 2019 Seventh International Conference on Advanced Cloud and Big Data (CBD …, 2019 | 6 | 2019 |