An Effective Conversation-Based Botnet Detection Method
Zhuo, Zhongliu, Zhang, Xiaosong, Niu, Weina, Chen, Ruidong, Lv, Fengmao
Published in Mathematical problems in engineering (01.01.2017)
Published in Mathematical problems in engineering (01.01.2017)
Get full text
Journal Article
Integrating Traffics with Network Device Logs for Anomaly Detection
Deng, Wei, Liu, Xiaolei, Zhang, Xiaosong, Zhuo, Zhongliu, Lv, Fengmao, Lu, Jiazhong, Hu, Teng
Published in Security and communication networks (01.01.2019)
Published in Security and communication networks (01.01.2019)
Get full text
Journal Article
Latent Gaussian process for anomaly detection in categorical data
Lv, Fengmao, Liang, Tao, Zhao, Jiayi, Zhuo, Zhongliu, Wu, Jinzhao, Yang, Guowu
Published in Knowledge-based systems (23.05.2021)
Published in Knowledge-based systems (23.05.2021)
Get full text
Journal Article
A temporal correlation and traffic analysis approach for APT attacks detection
Lu, Jiazhong, Chen, Kai, Zhuo, Zhongliu, Zhang, XiaoSong
Published in Cluster computing (01.05.2019)
Published in Cluster computing (01.05.2019)
Get full text
Journal Article
Improving data field hierarchical clustering using Barnes–Hut algorithm
Zhuo, Zhongliu, Zhang, Xiaosong, Niu, Weina, Yang, Guowu, Zhang, Jingzhong
Published in Pattern recognition letters (01.09.2016)
Published in Pattern recognition letters (01.09.2016)
Get full text
Journal Article
Adversarial attacks against profile HMM website fingerprinting detection model
Liu, Xiaolei, Zhuo, Zhongliu, Du, Xiaojiang, Zhang, Xiaosong, Zhu, Qingxin, Guizani, Mohsen
Published in Cognitive systems research (01.05.2019)
Published in Cognitive systems research (01.05.2019)
Get full text
Journal Article
A multi-granularity heuristic-combining approach for censorship circumvention activity identification: Multi-granularity heuristic censorship circumvention identification
Zhuo, Zhongliu, Zhang, Xiaosong, Li, Ruixing, Chen, Ting, Zhang, Jingzhong
Published in Security and communication networks (10.11.2016)
Published in Security and communication networks (10.11.2016)
Get full text
Journal Article
Phishing Emails Detection Using CS-SVM
Niu, Weina, Zhang, Xiaosong, Yang, Guowu, Ma, Zhiyuan, Zhuo, Zhongliu
Published in 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC) (01.12.2017)
Published in 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC) (01.12.2017)
Get full text
Conference Proceeding
METHOD AND APPARATUS FOR ADDING WATERMARK TO DATA, AND RELATED DEVICE
LI, Quandong, ZHUO, Zhongliu, WANG, Zhonggang, ZHU, Tao, WANG, Xinyu, QU, Fei
Year of Publication 09.05.2024
Get full text
Year of Publication 09.05.2024
Patent
METHOD AND APPARATUS FOR ADDING WATERMARK IN DATA, AND RELATED DEVICE
LI, Quandong, ZHUO, Zhongliu, WANG, Zhonggang, ZHU, Tao, WANG, Xinyu, QU, Fei
Year of Publication 24.04.2024
Get full text
Year of Publication 24.04.2024
Patent
Method and device for adding watermark in data and related equipment
ZHUO ZHONGLIU, QU FEI, ZHU TAO, LI QUANDONG, WANG XINYU, WANG ZHONGGANG
Year of Publication 13.01.2023
Get full text
Year of Publication 13.01.2023
Patent
METHOD AND APPARATUS FOR ADDING WATERMARK IN DATA, AND RELATED DEVICE
LI, Quandong, ZHUO, Zhongliu, WANG, Zhonggang, ZHU, Tao, WANG, Xinyu, QU, Fei
Year of Publication 12.01.2023
Get full text
Year of Publication 12.01.2023
Patent