default search action
Guang Cheng 0001
Person information
- affiliation: Southeast University, Nanjing, China
Other persons with the same name
- Guang Cheng — disambiguation page
- Guang Cheng 0002 — University of Florida, Gainesville, FL, USA
- Guang Cheng 0003 — University of California Los Angeles, Department of Statistics, CA, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j63]Jinfeng Chen, Hua Wu, Xiaohui Wang, Suyue Wang, Guang Cheng, Xiaoyan Hu:
IEA-DMS: An Interpretable feature-driven, Efficient and Accurate Detection Method for Slow HTTP DoS in high-speed networks. Comput. Secur. 150: 104291 (2025) - [j62]Mengli Wei, Wenwu Yu, Duxin Chen, Mingyu Kang, Guang Cheng:
Privacy Distributed Constrained Optimization Over Time-Varying Unbalanced Networks and Its Application in Federated Learning. IEEE CAA J. Autom. Sinica 12(2): 335-346 (2025) - 2024
- [j61]Jie Cao, Yuwei Xu, Enze Yu, Qiao Xiang, Kehui Song, Liang He, Guang Cheng:
GateKeeper: An UltraLite malicious traffic identification method with dual-aspect optimization strategies on IoT gateways. Comput. Networks 250: 110556 (2024) - [j60]Dandan Niu, Guang Cheng, Zihan Chen, Xing Qiu:
Video stalling identification for web live streaming under HTTP-FLV. Comput. Networks 254: 110714 (2024) - [j59]Xiaoyan Hu, Di Li, Miao Li, Guang Cheng, Ruidong Li, Hua Wu:
AHDom: Algorithmically generated domain detection using attribute heterogeneous graph neural network. Comput. Networks 254: 110770 (2024) - [j58]Suyue Wang, Hua Wu, Guang Cheng, Xiaoyan Hu, Jing Ren:
SD-MDN-TM: A traceback and mitigation integrated mechanism against DDoS attacks with IP spoofing. Comput. Networks 254: 110793 (2024) - [j57]Xiaoyan Hu, Meiqun Gui, Guang Cheng, Ruidong Li, Hua Wu:
Multi-class Bitcoin mixing service identification based on graph classification. Digit. Commun. Networks 10(6): 1881-1893 (2024) - [j56]Fangyuan Xing, Fei Tong, Jialong Yang, Guang Cheng, Shibo He:
RAM: A Resource-Aware DDoS Attack Mitigation Framework in Clouds. IEEE Trans. Cloud Comput. 12(4): 1387-1400 (2024) - [j55]Fei Tong, Yuanhang Zhou, Kaiming Wang, Guang Cheng, Jianyu Niu, Shibo He:
A Privacy-Preserving Incentive Mechanism for Mobile Crowdsensing Based on Blockchain. IEEE Trans. Dependable Secur. Comput. 21(6): 5071-5085 (2024) - [j54]Yuyang Zhou, Guang Cheng, Shui Yu, Zongyao Chen, Yujia Hu:
MTDroid: A Moving Target Defense-Based Android Malware Detector Against Evasion Attacks. IEEE Trans. Inf. Forensics Secur. 19: 6377-6392 (2024) - [j53]Hua Wu, Yujie Liu, Guang Cheng, Xiaoyan Hu:
RT-CBCH: Real-Time VPN Traffic Service Identification Based on Sampled Data in High-Speed Networks. IEEE Trans. Netw. Serv. Manag. 21(1): 88-107 (2024) - [j52]Zihan Chen, Guang Cheng, Zijun Wei, Dandan Niu, Nan Fu:
Classify Traffic Rather Than Flow: Versatile Multi-Flow Encrypted Traffic Classification With Flow Clustering. IEEE Trans. Netw. Serv. Manag. 21(2): 1446-1466 (2024) - [c92]Yali Yuan, Yichao Wang, Guang Cheng:
ProfistMAC: A Protocol Finite State Machine Classifier via Graph Representation. ACISP (2) 2024: 350-369 - [c91]Hangyu Zhao, Hua Wu, Xuqiong Bian, Songtao Liu, Guang Cheng, Xiaoyan Hu, Zhiyi Tian:
Unveiling the Unseen: Video Recognition Attacks on Social Software. ACISP (2) 2024: 412-432 - [c90]Manish Adhikari, Feng Wang, Chung-Chih Li, Guang Cheng, Yongning Tang:
SDT: Towards a Blockchain-Based Secure Data Trading Application. DAPPS 2024: 45-50 - [c89]Nan Hu, Hua Wu, Hangyu Zhao, Shanshan Ni, Guang Cheng:
Breaking Through the Diversity: Encrypted Video Identification Attack Based on QUIC Features. ESORICS (4) 2024: 166-186 - [c88]Hongyu Zhu, Sichu Liang, Wentao Hu, Fang-Qi Li, Yali Yuan, Shi-Lin Wang, Guang Cheng:
Improve Deep Forest with Learnable Layerwise Augmentation Policy Schedules. ICASSP 2024: 6660-6664 - [c87]Yuwei Xu, Zhengxin Xu, Jie Cao, Rongrong Wang, Yali Yuan, Guang Cheng:
TorHunter: A Lightweight Method for Efficient Identification of Obfuscated Tor Traffic Through Unsupervised Pre-training. ICICS (2) 2024: 3-23 - [c86]Yuanjie Zhao, Hua Wu, Liujinhan Chen, Songtao Liu, Guang Cheng, Xiaoyan Hu:
Identifying Video Resolution from Encrypted QUIC Streams in Segment-combined Transmission Scenarios. NOSSDAV 2024: 50-56 - [i5]Yali Yuan, Jian Ge, Guang Cheng:
DeMarking: A Defense for Network Flow Watermarking in Real-Time. CoRR abs/2402.03760 (2024) - 2023
- [j51]Hua Wu, Ziling Shao, Fuhao Yang, Guang Cheng, Xiaoyan Hu, Jing Ren, Wei Wang:
PD-CPS: A practical scheme for detecting covert port scans in high-speed networks. Comput. Networks 231: 109825 (2023) - [j50]Yuwei Xu, Jie Cao, Kehui Song, Qiao Xiang, Guang Cheng:
FastTraffic: A lightweight method for encrypted traffic fast classification. Comput. Networks 235: 109965 (2023) - [j49]Yuwei Xu, Jie Cao, Kehui Song, Qiao Xiang, Guang Cheng:
Corrigendum to "FastTraffic: A lightweight method for encrypted traffic fast classification" [Computer Networks, Volume 235, November 2023, 109965]. Comput. Networks 237: 110098 (2023) - [j48]Xiaoyan Hu, Zhuozhuo Shu, Zhongqi Tong, Guang Cheng, Ruidong Li, Hua Wu:
Fine-grained Ethereum behavior identification via encrypted traffic analysis with serialized backward inference. Comput. Networks 237: 110110 (2023) - [j47]Hua Wu, Weina Li, Xiying Chen, Guang Cheng, Xiaoyan Hu, Youqiong Zhuang:
Batch classifier with adaptive update for backbone traffic classification. Comput. Commun. 202: 57-72 (2023) - [j46]Nan Fu, Guang Cheng, Xinyue Su:
Accurate compressed traffic detection via traffic analysis using Graph Convolutional Network based on graph structure feature. Comput. Commun. 207: 128-139 (2023) - [j45]Tian Qin, Guang Cheng, Yichen Wei, Zifan Yao:
Hier-SFL: Client-edge-cloud collaborative traffic classification framework based on hierarchical federated split learning. Future Gener. Comput. Syst. 149: 12-24 (2023) - [j44]Xiaoyan Hu, Cheng Zhu, Guang Cheng, Ruidong Li, Hua Wu, Jian Gong:
A Deep Subdomain Adaptation Network With Attention Mechanism for Malware Variant Traffic Identification at an IoT Edge Gateway. IEEE Internet Things J. 10(5): 3814-3826 (2023) - [j43]Yuyu Zhao, Guang Cheng, Chunxiang Liu, Zihan Chen, Donglai Xu:
Snapshot for Power Grids IoT: Adaptive Measurement for Resilience Intelligent Internet of Things. IEEE Internet Things J. 10(16): 14084-14101 (2023) - [j42]Ziqiang Wang, Ke Xu, Guang Cheng, Xiaoliang Wang, Shenglin Jiang, Yi Cai:
A Negotiation-Based Scheme for Interconnecting Heterogeneous Networks With Enhanced Services. IEEE Netw. 37(5): 190-196 (2023) - [j41]Xiaoyan Hu, Weicheng Zhou, Jun Yin, Guang Cheng, Shen Yan, Hua Wu:
Towards verifiable and privacy-preserving account model on a consortium blockchain based on zk-SNARKs. Peer Peer Netw. Appl. 16(4): 1834-1851 (2023) - [j40]Yuyu Zhao, Guang Cheng, Yongning Tang:
SINT: Toward a Blockchain-Based Secure In-Band Network Telemetry Architecture. IEEE Trans. Inf. Forensics Secur. 18: 2667-2682 (2023) - [j39]Xiaoyan Hu, Hao Chen, Miao Li, Guang Cheng, Ruidong Li, Hua Wu, Yali Yuan:
ReplaceDGA: BiLSTM-Based Adversarial DGA With High Anti-Detection Ability. IEEE Trans. Inf. Forensics Secur. 18: 4406-4421 (2023) - [j38]Xiaoyan Hu, Wenjie Gao, Guang Cheng, Ruidong Li, Yuyang Zhou, Hua Wu:
Toward Early and Accurate Network Intrusion Detection Using Graph Embedding. IEEE Trans. Inf. Forensics Secur. 18: 5817-5831 (2023) - [j37]Hua Wu, Ya Liu, Shanshan Ni, Guang Cheng, Xiaoyan Hu:
LossDetection: Real-Time Packet Loss Monitoring System for Sampled Traffic Data. IEEE Trans. Netw. Serv. Manag. 20(1): 30-45 (2023) - [j36]Dandan Niu, Guang Cheng, Zihan Chen:
TDS-KRFI: Reference Frame Identification for Live Web Streaming Toward HTTP Flash Video Protocol. IEEE Trans. Netw. Serv. Manag. 20(4): 4198-4215 (2023) - [j35]Ziling Shao, Tingzheng Chen, Guang Cheng, Xiaoyan Hu, Weina Li, Hua Wu:
AF-FDS: An Accurate, Fast, and Fine-Grained Detection Scheme for DDoS Attacks in High-Speed Networks With Asymmetric Routing. IEEE Trans. Netw. Serv. Manag. 20(4): 4964-4981 (2023) - [j34]Hua Wu, Xin Li, Gang Wang, Guang Cheng, Xiaoyan Hu:
Resolution Identification of Encrypted Video Streaming Based on HTTP/2 Features. ACM Trans. Multim. Comput. Commun. Appl. 19(2): 73:1-73:23 (2023) - [c85]Weiwei Zhu, Hua Wu, Jingwen Quan, Guang Cheng, Xiaoyan Hu:
Accurate Identification of Encrypted Videos in Asymmetric Routing Scenarios. APNOMS 2023: 310-313 - [c84]Xiaoyan Hu, Yuxin Shi, Guang Cheng, Ruidong Li, Hua Wu, Gang Wang:
Towards Early and Accurate IoT Device-Type Identification with Global Attention Mechanism. GLOBECOM 2023: 3445-3450 - [c83]Gang Wang, Hua Wu, Guang Cheng, Xiaoyan Hu, Yuxin Shi:
Website Fingerprinting with Packet Sampling: A More Realistic Approach in Real-World Networks. GLOBECOM 2023: 7103-7108 - [c82]Xiaoyan Hu, Boquan Lin, Guang Cheng, Ruidong Li, Hua Wu:
Detecting Cryptomining Traffic Over an Encrypted Proxy Based on K-S Test. ICC 2023: 3787-3792 - [c81]Xiaoyan Hu, Ning Li, Guang Cheng, Ruidong Li, Hua Wu:
A Novel Darknet Traffic Classification Method Based on Knowledge Graph with Dynamic Embedding Learning. ICC 2023: 3799-3804 - [c80]Shiyue Liu, Hua Wu, Guang Cheng, Xiaoyan Hu:
Real-Time Phishing Detection Based on URL Multi-Perspective Features: Aiming at the Real Web Environment. ICC 2023: 3811-3816 - [c79]Zhaoxu Ge, Hua Wu, Guang Cheng, Xiaoyan Hu:
NFlowGAN: High-Utility Privacy-Preserving Network Flow Synthesis Based on GAN. ICC 2023: 4057-4062 - [c78]Yuwei Xu, Zehui Wu, Jie Cao, Jingdong Xu, Guang Cheng:
DarkTrans: A Blockchain-based Covert Communication Scheme with High Channel Capacity and Strong Concealment. ICPADS 2023: 675-682 - [c77]Yichen Wei, Guang Cheng, Tian Qin, Zihan Chen:
A Hypernetwork-based Personalized Federated Learning Framework for Encrypted Traffic Classification. MSN 2023: 536-543 - [c76]Yuhang Shan, Guang Cheng, Zihan Chen:
Identifying Fine-Grained Douyin User Behaviors via Analyzing Encrypted Network Traffic. MSN 2023: 868-875 - [c75]Jinfeng Chen, Hua Wu, Suyue Wang, Guang Cheng, Xiaoyan Hu:
An Accurate and Real-Time Detection Method for Concealed Slow HTTP DoS in Backbone Network. SEC 2023: 207-221 - [c74]Anting Lu, Hua Wu, Hao Luo, Guang Cheng, Xiaoyan Hu:
Real-Time Platform Identification of VPN Video Streaming Based on Side-Channel Attack. SEC 2023: 335-349 - [c73]Yuwei Xu, Xiaotian Fang, Jie Cao, Rou Yu, Kehui Song, Guang Cheng:
Cerberus: Efficient OSPS Traffic Identification through Multi-Task Learning. TrustCom 2023: 504-511 - [c72]Yuwei Xu, Zizhi Zhu, Yunpeng Bai, Lilanyi Wu, Kehui Song, Guang Cheng:
SharpEye: Identify mKCP Camouflage Traffic through Feature Optimization. TrustCom 2023: 1157-1164 - [i4]Hongyu Zhu, Sichu Liang, Wentao Hu, Fang-Qi Li, Yali Yuan, Shi-Lin Wang, Guang Cheng:
Improve Deep Forest with Learnable Layerwise Augmentation Policy Schedule. CoRR abs/2309.09030 (2023) - [i3]Yuyang Zhou, Guang Cheng, Zongyao Chen, Shui Yu:
MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks. CoRR abs/2312.06423 (2023) - 2022
- [j33]Xiaoyan Hu, Xiaoyi Song, Guang Cheng, Hua Wu, Jian Gong:
Efficient sharing of privacy-preserving sensing data on consortium blockchain via group key agreement. Comput. Commun. 194: 44-54 (2022) - [j32]Shanqing Jiang, Lin Yang, Guang Cheng, Xianming Gao, Tao Feng, Yuyang Zhou:
A quantitative framework for network resilience evaluation using Dynamic Bayesian Network. Comput. Commun. 194: 387-398 (2022) - [j31]Zihan Chen, Guang Cheng, Ziheng Xu, Shuyi Guo, Yuyang Zhou, Yuyu Zhao:
Length matters: Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning. Digit. Commun. Networks 8(3): 289-302 (2022) - [j30]Xiaoyan Hu, Cheng Zhu, Zhongqi Tong, Wenjie Gao, Guang Cheng, Ruidong Li, Hua Wu, Jian Gong:
Identifying Ethereum traffic based on an active node library and DEVp2p features. Future Gener. Comput. Syst. 132: 162-177 (2022) - [j29]Yujian Zhang, Yuhao Luo, Xing Chen, Fei Tong, Yuwei Xu, Jun Tao, Guang Cheng:
A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT. Secur. Commun. Networks 2022: 9686049:1-9686049:15 (2022) - [j28]Yuyang Zhou, Guang Cheng, Yuyu Zhao, Zihan Chen, Shanqing Jiang:
Toward Proactive and Efficient DDoS Mitigation in IIoT Systems: A Moving Target Defense Approach. IEEE Trans. Ind. Informatics 18(4): 2734-2744 (2022) - [j27]Ying Hu, Guang Cheng, Wenchao Chen, Bomiao Jiang:
Attribute-Based Zero-Shot Learning for Encrypted Traffic Classification. IEEE Trans. Netw. Serv. Manag. 19(4): 4583-4599 (2022) - [c71]Hua Wu, Yuping Sui, Guang Cheng, Xiaoyan Hu, Qinghua Shang:
Service classification of high-speed network traffic based on Two-Stage Clustering. APNOMS 2022: 1-6 - [c70]Youqiong Zhuang, Hua Wu, Songtao Liu, Guang Cheng, Xiaoyan Hu:
HDS: A Hierarchical Scheme for Accurate and Efficient DDoS Flooding Attack Detection. APNOMS 2022: 1-6 - [c69]Xiaoyan Hu, Yishu Gao, Guang Cheng, Hua Wu, Ruidong Li:
An Adversarial Learning-based Tor Malware Traffic Detection Model. GLOBECOM 2022: 74-79 - [c68]Junchen Li, Guang Cheng, Zekun Jing, Haiyang Wei:
Private Protocol Traffic Identification Based on Sequence Statistical Fingerprint. GLOBECOM 2022: 1356-1361 - [c67]Xiaoyan Hu, Yuelin Hu, Guang Cheng, Hua Wu, Yifei Qin, Jian Gong:
A Dynamic Access Control Model Based on Attributes and Intro VAE. GLOBECOM 2022: 1379-1384 - [c66]Hua Wu, Ziling Shao, Guang Cheng, Xiaoyan Hu, Jing Ren, Wei Wang:
Detecting Slow Port Scans of Long Duration in High-Speed Networks. GLOBECOM 2022: 3405-3410 - [c65]Xiaoyan Hu, Miao Li, Guang Cheng, Ruidong Li, Hua Wu, Jian Gong:
Towards Accurate DGA Detection based on Siamese Network with Insufficient Training Samples. ICC 2022: 2670-2675 - [c64]Hua Wu, Xuange Zhang, Tingzheng Chen, Guang Cheng, Xiaoyan Hu:
IM-Shield: A Novel Defense System against DDoS Attacks under IP Spoofing in High-speed Networks. ICC 2022: 4168-4173 - [c63]Hua Wu, Yujie Liu, Guang Cheng, Xiaoyan Hu:
Real-time Identification of VPN Traffic based on Counting Bloom Filter and Chained Hash Table from Sampled Data in High-speed Networks. ICC 2022: 5070-5075 - [c62]Hua Wu, Chengfei Zhu, Guang Cheng, Xiaoyan Hu:
Real-time Application Identification of RTC Media Streams via Encrypted Traffic Analysis. ICCCN 2022: 1-10 - [c61]Hua Wu, Chaoqun Cui, Guang Cheng, Xiaoyan Hu:
PSCM: Towards Practical Encrypted Unknown Protocol Classification. ISCC 2022: 1-6 - [c60]Hua Wu, Xingmeng Fan, Guang Cheng, Xiaoyan Hu:
Identify IoT Devices from Backbone Networks Using Lightweight Neural Networks. LCN 2022: 140-148 - [c59]Hua Wu, Rui Wang, Guang Cheng, Xiaoyan Hu:
Service-Based Identification of Highly Coupled Mobile Applications. LCN 2022: 279-282 - [c58]Deyu Zhao, Guang Cheng, Yuyu Zhao, Ruixing Zhu:
NT-RP: A High-Versatility Approach for Network Telemetry Based on FPGA Dynamic Reconfigurable Pipeline. WASA (3) 2022: 96-107 - [c57]Zihan Chen, Guang Cheng, Zijun Wei, Ziheng Xu, Nan Fu, Yuyang Zhou:
Higher Layers, Better Results: Application Layer Feature Engineering in Encrypted Traffic Classification. WASA (2) 2022: 548-556 - [c56]Xiaoyan Hu, Jun Yin, Guang Cheng, Jian Gong, Lu Yang, Honggang Chen, Zhichao Liang:
Verifying Privacy-Preserving Financing Orders on a Consortium Blockchain Based on zk-SNARKs. WCNC 2022: 1527-1532 - 2021
- [j26]Yuyu Zhao, Guang Cheng, Yu Duan, Zhouchao Gu, Yuyang Zhou, Lu Tang:
Secure IoT edge: Threat situation awareness based on network traffic. Comput. Networks 201: 108525 (2021) - [j25]Xiaoyan Hu, Zechen Wang, Xiangjun Liu, Xinran Li, Guang Cheng, Jian Gong:
Exploring real-time super-resolution generative adversarial networks. Int. J. Sens. Networks 36(2): 85-96 (2021) - [j24]Hua Wu, Qiuyan Wu, Guang Cheng, Shuyi Guo, Xiaoyan Hu, Shen Yan:
SFIM: Identify user behavior based on stable features. Peer-to-Peer Netw. Appl. 14(6): 3674-3687 (2021) - [j23]Haibin Shi, Guang Cheng, Ying Hu, Fuzhou Wang, Haoxuan Ding:
RT-SAD: Real-Time Sketch-Based Adaptive DDoS Detection for ISP Network. Secur. Commun. Networks 2021: 9409473:1-9409473:10 (2021) - [j22]Yang Gao, Jun Tao, Yifan Xu, Zuyan Wang, Weice Sun, Guang Cheng:
CEBD: Contact-Evidence-Driven Blackhole Detection Based on Machine Learning in OppNets. IEEE Trans. Comput. Soc. Syst. 8(6): 1344-1356 (2021) - [j21]Yuyang Zhou, Guang Cheng, Shui Yu:
An SDN-Enabled Proactive Defense Framework for DDoS Mitigation in IoT Networks. IEEE Trans. Inf. Forensics Secur. 16: 5366-5380 (2021) - [c55]Xiaoyan Hu, Zhuozhuo Shu, Xiaoyi Song, Guang Cheng, Jian Gong:
Detecting Cryptojacking Traffic Based on Network Behavior Features. GLOBECOM 2021: 1-6 - [c54]Hua Wu, Tingzheng Chen, Ziling Shao, Guang Cheng, Xiaoyan Hu:
Accurate and Fast Detection of DDoS Attacks in High-Speed Network with Asymmetric Routing. GLOBECOM 2021: 1-6 - [c53]Hua Wu, Lu Wang, Guang Cheng, Xiaoyan Hu:
Mobile Application Encryption Traffic Classification Based On TLS Flow Sequence Network. ICC Workshops 2021: 1-6 - [c52]Tian Qin, Guang Cheng, Wenchao Chen, Si Wu:
A Lightweight Residual Networks Framework for DDoS Attack Classification Based on Federated Learning. INFOCOM Workshops 2021: 1-6 - [c51]Hua Wu, Xin Li, Guang Cheng, Xiaoyan Hu:
Monitoring Video Resolution of Adaptive Encrypted Video Traffic Based on HTTP/2 Features. INFOCOM Workshops 2021: 1-6 - [c50]Hua Wu, Ya Liu, Guang Cheng, Xiaoyan Hu:
Real-time Packet Loss Detection for TCP and UDP Based on Feature-Sketch. INFOCOM Workshops 2021: 1-6 - [c49]Hua Wu, Xiying Chen, Guang Cheng, Xiaoyan Hu, Youqiong Zhuang:
BCAC: Batch Classifier based on Agglomerative Clustering for traffic classification in a backbone network. IWQoS 2021: 1-10 - [c48]Yuyu Zhao, Guang Cheng, Chunxiang Liu, Zihan Chen:
Snapshot for IoT: Adaptive Measurement for Multidimensional QoS Resources. IWQoS 2021: 1-10 - [c47]Yang Gao, Jun Tao, Zuyan Wang, Wenqiang Li, Guang Cheng:
Analytical Optimal Solution of Selfish Node Detection with 2-hop Constraints in OppNets. MASS 2021: 53-61 - [c46]Tian Qin, Guang Cheng, Wenchao Chen, Xuan Lei:
FNEL: An Evolving Intrusion Detection System Based on Federated Never-Ending Learning. MSN 2021: 239-246 - [c45]Xiaoyan Hu, Xiaoyi Song, Guang Cheng, Jian Gong, Lu Yang, Honggang Chen, Zhichao Liang:
Towards Efficient Co-audit of Privacy-Preserving Data on Consortium Blockchain via Group Key Agreement. MSN 2021: 494-501 - [c44]Hantao Mei, Guang Cheng, Wei Gao, Junqiang Chen:
Website Fingerprinting on Access network and Core Gateway. MSN 2021: 671-678 - [c43]Yiwei Yu, Guang Cheng, Zihan Chen, Haoxuan Ding:
A DDoS protection method based on traffic scheduling and scrubbing in SDN. MSN 2021: 758-765 - [i2]Shanqing Jiang, Lin Yang, Guang Cheng, Xianming Gao, Tao Feng, Yuyang Zhou:
A Quantitative Framework for Network Resilience Evaluation using Dynamic Bayesian Network. CoRR abs/2108.09040 (2021) - 2020
- [j20]Xiaoyan Hu, Shaoqi Zheng, Guoqiang Zhang, Lixia Zhao, Guang Cheng, Jian Gong, Ruidong Li:
An on-demand off-path cache exploration based multipath forwarding strategy. Comput. Networks 166 (2020) - [j19]Yuyang Zhou, Guang Cheng, Shanqing Jiang, Mian Dai:
Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput. Networks 174: 107247 (2020) - [j18]Ying Hu, Guang Cheng, Yongning Tang, Feng Wang:
A practical design of hash functions for IPv6 using multi-objective genetic programming. Comput. Commun. 162: 160-168 (2020) - [j17]Yuyang Zhou, Guang Cheng, Shanqing Jiang, Yuyu Zhao, Zihan Chen:
Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processes. Comput. Secur. 97: 101976 (2020) - [j16]Guang Cheng, Lixia Zhao, Xiaoyan Hu, Shaoqi Zheng, Hua Wu, Chengyu Fan:
A network-wide view-based detection and mitigation of a sophisticated Interest Flooding Attack. EURASIP J. Wirel. Commun. Netw. 2020(1): 144 (2020) - [c42]Hua Wu, Yu Gu, Guang Cheng, Yuyang Zhou:
Effectiveness Evaluation Method for Cyber Deception Based on Dynamic Bayesian Attack Graph. CSSE 2020: 1-9 - [c41]Xiaoyan Hu, Xiaoyi Song, Shaoqi Zheng, Ruidong Li, Guang Cheng, Jian Gong:
Towards Network Coding and Request Pipelining Enabled NDN for Big Data Transmission. GLOBECOM 2020: 1-6 - [c40]Xiaoyan Hu, Jun Yin, Shaoqi Zheng, Ruidong Li, Guang Cheng, Jian Gong:
A Demand and Responsiveness-based Caching Strategy for Network Coding Enabled NDN. GLOBECOM 2020: 1-6 - [c39]Hua Wu, Zhenhua Yu, Guang Cheng, Shuyi Guo:
Identification of Encrypted Video Streaming Based on Differential Fingerprints. INFOCOM Workshops 2020: 74-79 - [c38]Hua Wu, Qiuyan Wu, Guang Cheng, Shuyi Guo:
Instagram User Behavior Identification Based on Multidimensional Features. INFOCOM Workshops 2020: 1111-1116 - [c37]Zihan Chen, Guang Cheng, Bomiao Jiang, Shuye Tang, Shuyi Guo, Yuyang Zhou:
Length Matters: Fast Internet Encrypted Traffic Service Classification based on Multi-PDU Lengths. MSN 2020: 531-538 - [c36]Feng Wang, Yongning Tang, Lixin Gao, Guang Cheng:
BC-Sketch: A Simple Reversible Sketch for Detecting Network Anomalies. SMDS 2020: 36-44 - [c35]Fei Tong, Yujian Zhang, Jun Tao, Guanghui Wang, Xiufang Shi, Guang Cheng:
EPDC: An Enhanced Pipelined Data Collection MAC for Duty-Cycled Linear Sensor Networks. VTC Fall 2020: 1-5 - [c34]Yujian Zhang, Fei Tong, Yuwei Xu, Jun Tao, Guang Cheng:
A Privacy-Preserving Authentication Scheme for VANETs based on Consortium Blockchain. VTC Fall 2020: 1-6
2010 – 2019
- 2019
- [j15]Guang Cheng, Chunsheng Guo, Yongning Tang:
dptCry: an approach to decrypting ransomware WannaCry based on API hooking. CCF Trans. Netw. 2(3-4): 207-216 (2019) - [j14]Qingjun Xiao, Shigang Chen, Jia Liu, Guang Cheng, Junzhou Luo:
A Protocol for Simultaneously Estimating Moments and Popular Groups in a Multigroup RFID System. IEEE/ACM Trans. Netw. 27(1): 143-158 (2019) - [j13]Qingjun Xiao, Youlin Zhang, Shigang Chen, Min Chen, Jia Liu, Guang Cheng, Junzhou Luo:
Estimating Cardinality of Arbitrary Expression of Multiple Tag Sets in a Distributed RFID System. IEEE/ACM Trans. Netw. 27(2): 748-762 (2019) - [c33]Xiaoyan Hu, Xiangjun Liu, Zechen Wang, Xinran Li, Wenqiang Peng, Guang Cheng:
RTSRGAN: Real-Time Super-Resolution Generative Adversarial Networks. CBD 2019: 321-326 - [c32]Yuyang Zhou, Guang Cheng, Shanqing Jiang, Ying Hu, Yuyu Zhao, Zihan Chen:
A Cost-effective Shuffling Method against DDoS Attacks using Moving Target Defense. MTD@CCS 2019: 57-66 - [c31]Xiaoyan Hu, Shaoqi Zheng, Jian Gong, Guang Cheng, Guoqiang Zhang, Ruidong Li:
Enabling Linearly Homomorphic Signatures in Network Coding-based Named Data Networking. CFI 2019: 2:1-2:4 - [c30]Hua Wu, Guang Cheng, Xiaoyan Hu:
Inferring ADU Combinations from Encrypted QUIC Stream. CFI 2019: 4:1-4:6 - [c29]Yongning Tang, Yangxuan Wu, Guang Cheng, Zhiwei Xu:
Intelligence Enabled SDN Fault Localization via Programmable In-band Network Telemetry. HPSR 2019: 1-6 - [c28]Guang Cheng, Lixia Zhao, Xiaoyan Hu, Shaoqi Zheng, Hua Wu, Ruidong Li, Chengyu Fan:
Detecting and Mitigating A Sophisticated Interest Flooding Attack in NDN from the Network-Wide View. NMIC@ICDCS 2019: 7-12 - [c27]Xiaoyan Hu, Shaoqi Zheng, Lixia Zhao, Guang Cheng, Jian Gong:
Exploration and Exploitation of Off-path Cached Content in Network Coding Enabled Named Data Networking. ICNP 2019: 1-6 - [i1]Yuyang Zhou, Guang Cheng, Shanqing Jiang, Ying Hu, Yuyu Zhao, Zihan Chen:
A cost-effective shuffling method against DDoS attacks using Moving Target Defense. CoRR abs/1903.10102 (2019) - 2018
- [j12]Wubin Pan, Guang Cheng:
QoE Assessment of Encrypted YouTube Adaptive Streaming for Energy Saving in Smart Cities. IEEE Access 6: 25142-25156 (2018) - [j11]Xiaoyan Hu, Jian Gong, Guang Cheng, Guoqiang Zhang, Chengyu Fan:
Mitigating Content Poisoning With Name-Key Based Forwarding and Multipath Forwarding Based Inband Probe for Energy Management in Smart Cities. IEEE Access 6: 39692-39704 (2018) - [c26]Guang Cheng, Ying Hu:
Encrypted Traffic Identification Based on N-gram Entropy and Cumulative Sum Test. CFI 2018: 9:1-9:6 - 2017
- [j10]Chengang Zhu, Guang Cheng, Kun Wang:
Big Data Analytics for Program Popularity Prediction in Broadcast TV Industries. IEEE Access 5: 24593-24601 (2017) - [c25]Guang Cheng, Jun Yu:
Adaptive Sampling for OpenFlow Network Measurement Methods. CFI 2017: 4:1-4:7 - [c24]Guang Cheng, Yongning Tang:
eOpenFlow: Software defined sampling via a highly adoptable OpenFlow extension. ICC 2017: 1-6 - [c23]Chengang Zhu, Guang Cheng, Kun Wang:
Program Popularity Prediction Approach for Internet TV Based on Trend Detecting. INISCOM 2017: 142-154 - [c22]Wubin Pan, Guang Cheng, Yongning Tang:
WENC: HTTPS Encrypted Traffic Classification Using Weighted Ensemble Learning and Markov Chain. TrustCom/BigDataSE/ICESS 2017: 50-57 - 2016
- [j9]Yongning Tang, Guang Cheng, Zhiwei Xu, Feng Chen, Khalid Elmansor, Yangxuan Wu:
Automatic belief network modeling via policy inference for SDN fault localization. J. Internet Serv. Appl. 7(1): 1:1-1:13 (2016) - [j8]Dinhtu Truong, Guang Cheng:
Detecting domain-flux botnet based on DNS traffic features in managed network. Secur. Commun. Networks 9(14): 2338-2347 (2016) - [c21]Yongning Tang, Guang Cheng, Zhiwei Xu, Feng Chen:
Service Oriented Verification Integrated Fault Reasoning for SDNs. AINA 2016: 624-629 - [c20]Mian Dai, Guang Cheng, Yuxiang Wang:
Detecting Network Topology and Packet Trajectory with SDN-enabled FPGA Platform. CFI 2016: 7-13 - [c19]Chengang Zhu, Guang Cheng, Xiaojun Guo, Yuxiang Wang:
RBAS: A Real-Time User Behavior Analysis System for Internet TV in Cloud Computing. CFI 2016: 36-42 - [c18]Xiaojun Guo, Guang Cheng, Yifei Hu, Mian Dai:
Progress in Command and Control Server Finding Schemes of Botnet. Trustcom/BigDataSE/ISPA 2016: 1723-1727 - 2015
- [j7]Aiping Zhou, Guang Cheng, Xiaojun Guo, Dinhtu Truong, Chengang Zhu:
Heavy hitter identification based on adaptive sampling with mapreduce. Comput. Syst. Sci. Eng. 30(6) (2015) - [c17]Xiaojun Guo, Guang Cheng, Wubin Pan, Truong Dinhtu, Yixin Liang:
A Novel Search Engine-Based Method for Discovering Command and Control Server. ICA3PP (3) 2015: 311-322 - [c16]Xiaoyan Hu, Jian Gong, Guang Cheng, Chengyu Fan:
Enhancing in-network caching by coupling cache placement, replacement and location. ICC 2015: 5672-5678 - 2013
- [j6]Guang Cheng, Yongning Tang:
Line speed accurate superspreader identification using dynamic error compensation. Comput. Commun. 36(13): 1460-1470 (2013) - [j5]Guang Cheng, Yongning Tang:
PortView: identifying port roles based on port fuzzy macroscopic behavior. J. Internet Serv. Appl. 4(1): 9:1-9:12 (2013) - [j4]Yongning Tang, Guang Cheng, James T. Yu, Bin Zhang:
Catching modern botnets using active integrated evidential reasoning. J. Internet Serv. Appl. 4(1): 20:1-20:10 (2013) - [c15]Xiaojun Guo, Guang Cheng, Chengang Zhu, Aiping Zhou, Wubin Pan, Dinhtu Truong:
Make Your Webpage Carry Abundant Secret Information Unawarely. HPCC/EUC 2013: 541-548 - 2012
- [c14]Guang Cheng, Hua Wu:
A NetFlow v9 Measurement System with Network Performance Function. IDCS 2012: 134-145 - [c13]Guang Cheng:
Estimating the number of active flows from sampled packets. NOMS 2012: 675-678 - 2011
- [j3]Yongning Tang, Guang Cheng, Zhiwei Xu:
Probabilistic and reactive fault diagnosis for dynamic overlay networks. Peer-to-Peer Netw. Appl. 4(4): 439-452 (2011)
2000 – 2009
- 2009
- [c12]Yongning Tang, Guang Cheng, Zhiwei Xu, Ehab Al-Shaer:
Community-base Fault Diagnosis Using Incremental Belief Revision. NAS 2009: 121-128 - [c11]Guang Cheng, Yongning Tang, Jiexin Jiang, Wei Ding:
A Trace Measurement and Analysis System for the Multi-Links CERNET Backbone. NAS 2009: 341-346 - 2008
- [j2]Guang Cheng, Jian Gong, Wei Ding, Hua Wu, ShiQiang Qiang:
Adaptive sampling algorithm for detection of superpoints. Sci. China Ser. F Inf. Sci. 51(11): 1804-1821 (2008) - [c10]Guang Cheng, Jian Gong:
A Detecting Superpoint Algorithm on Multiple Sampling Technology. FGCN (1) 2008: 102-105 - [c9]Guang Cheng, Wei Zhao, Jian Gong:
XOR Hashing Algorithms to Measured Flows at the High-Speed Link. FGCN (1) 2008: 152-155 - 2007
- [j1]Guang Cheng, Jian Gong:
A Resource-Efficient Flow Monitoring System. IEEE Commun. Lett. 11(6): 558-560 (2007) - [c8]Guang Cheng, Jian Gong, Yongning Tang:
A Hybrid Sampling Approach for Network Flow Monitoring. E2EMON 2007: 1-7 - [c7]Guang Cheng, Yongning Tang, Wei Ding:
A Double-Sampling and Hold Based Approach for Accurate and Efficient Network Flow Monitoring. International Conference on Computational Science (4) 2007: 857-864 - 2006
- [c6]Mingzhong Zhou, Jian Gong, Wei Ding, Guang Cheng:
Multi-Granularities Counting Bloom Filter. HPCC 2006: 542-551 - [c5]Weijiang Liu, Jian Gong, Wei Ding, Guang Cheng:
An Algorithm for Estimation of Flow Length Distributions Using Heavy-Tailed Feature. International Conference on Computational Science (4) 2006: 144-151 - 2005
- [c4]Guang Cheng, Jian Gong, Wei Ding:
Network Traffic Sampling Model on Packet Identification. ICN (1) 2005: 758-765 - [c3]Guang Cheng, Jian Gong, Wei Ding:
A Time-Series Decomposed Model of Network Traffic. ICNC (2) 2005: 338-345 - 2004
- [c2]Guang Cheng, Jian Gong, Wei Ding:
A relative time model in a distributed network using exchanged time information. CCNC 2004: 382-387 - 2002
- [c1]Guang Cheng, Jian Gong, Wei Ding:
A traffic sampling model for measurement using packet identification. ICON 2002: 409-413
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-02 22:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint