default search action
Futai Zou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Yuelin Hu, Futai Zou, Jiajia Han, Xin Sun, Yilei Wang:
LLM-TIKG: Threat intelligence knowledge graph construction utilizing large language model. Comput. Secur. 145: 103999 (2024) - [j13]Zehui Zhang, Futai Zou, Jianan Hong, Libo Chen, Ping Yi:
Detection and Analysis of Broken Access Control Vulnerabilities in App-Cloud Interaction in IoT. IEEE Internet Things J. 11(17): 28267-28280 (2024) - [c44]Chengchen Zhu, Kunling Li, Jianan Hong, Cunqing Hua, Futai Zou:
A Secure and Private Authentication Based on Radio Frequency Fingerprinting. ICC 2024: 2210-2215 - [c43]Jiayue Zhou, Jianan Hong, Chengchen Zhu, Futai Zou, Cunqing Hua:
Trustful Blockchain-Enabled Identity Management for VANET with Short-Latency Authentication. ICNC 2024: 659-663 - 2023
- [j12]Bolun Wu, Futai Zou, Ping Yi, Yue Wu, Liang Zhang:
SlicedLocator: Code vulnerability locator based on sliced dependence graph. Comput. Secur. 134: 103469 (2023) - [j11]Bolun Wu, Futai Zou, Chengwei Zhang, Tangda Yu, Yun Li:
Multi-field relation mining for malicious HTTP traffic detection based on attention and cross network. J. Inf. Secur. Appl. 73: 103411 (2023) - [c42]Futai Zou, Yuelin Hu, Wenliang Xu, Yue Wu:
Link Prediction-Based Multi-Identity Recognition of Darknet Vendors. ICICS 2023: 317-332 - 2022
- [j10]Jingcheng Yang, Hongwei Li, Shuo Shao, Futai Zou, Yue Wu:
FS-IDS: A framework for intrusion detection based on few-shot learning. Comput. Secur. 122: 102899 (2022) - [c41]Mingjie Nie, Futai Zou, Yi Qin, Tianming Zheng, Yue Wu:
QUIC-CNN: Website Fingerprinting for QUIC Traffic in Tor Network. HPCC/DSS/SmartCity/DependSys 2022: 663-671 - [c40]Yi Qin, Tianming Zheng, Yue Wu, Futai Zou:
Tracing Tor Hidden Service Through Protocol Characteristics. ICCCN 2022: 1-9 - [c39]Yi Qin, Jiahe Wu, Futai Zou, Yue Wu:
Breaking Tor's Anonymity by Modifying Cell's Command. ISCC 2022: 1-7 - [c38]Haochen Zhai, Futai Zou, Junhua Tang, Yue Wu:
Towards High Transferability on Neural Network for Black-Box Adversarial Attacks. SecureComm 2022: 72-88 - 2021
- [j9]Wenliang Xu, Futai Zou:
Obfuscated Tor Traffic Identification Based on Sliding Window. Secur. Commun. Networks 2021: 5587837:1-5587837:11 (2021) - [c37]Chengwei Zhang, Yunlu Xu, Zhanzhan Cheng, Shiliang Pu, Yi Niu, Fei Wu, Futai Zou:
SPIN: Structure-Preserving Inner Offset Network for Scene Text Recognition. AAAI 2021: 3305-3314 - [c36]Futai Zou, Yundong Ren, Jiachen Zhu, Junhua Tang:
Detecting Data Leakage in DNS Traffic based on Time Series Anomaly Detection. HPCC/DSS/SmartCity/DependSys 2021: 503-510 - [c35]Futai Zou, Haochen Zhai:
Browser Fingerprinting Identification Using Incremental Clustering Algorithm Based on Autoencoder. HPCC/DSS/SmartCity/DependSys 2021: 525-532 - [c34]Jingsong Li, Junhua Tang, Jianhua Li, Futai Zou:
Deep Reinforcement Learning for Intelligent Computing and Content Edge Service in ICN-based IoV. ICC Workshops 2021: 1-7 - [c33]Chenqi Xie, Ping Yi, Baowen Zhang, Futai Zou:
DeepMark: Embedding Watermarks into Deep Neural Network Using Pruning. ICTAI 2021: 169-175 - [c32]Futai Zou, Qianying Shen, Yuzong Hu:
Word-Map: Using Community Detection Algorithm to Detect AGDs. ISC 2021: 398-414 - [c31]Yuheng Wei, Futai Zou:
Automatic Generation of Malware Threat Intelligence from Unstructured Malware Traces. SecureComm (1) 2021: 44-61 - [c30]Bolun Wu, Yuanhang Xu, Futai Zou:
Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs. TrustCom 2021: 540-547 - [c29]Futai Zou, Dechao Meng, Wentao Gao, Linsen Li:
DePL: Detecting Privacy Leakage in DNS-over-HTTPS Traffic. TrustCom 2021: 577-586 - 2020
- [j8]Xiaoshi Liang, Futai Zou, Linsen Li, Ping Yi:
Mobile terminal identity authentication system based on behavioral characteristics. Int. J. Distributed Sens. Networks 16(1) (2020) - [c28]Lingxuan Zhang, Linsen Li, Futai Zou, Jiachao Niu:
Quantitatively Assessing the Cyber-to-Physical Risk of Industrial Cyber-Physical Systems. ACM Great Lakes Symposium on VLSI 2020: 439-444 - [c27]Qianying Shen, Futai Zou:
Detecting Dictionary Based AGDs Based on Community Detection. SecureComm (1) 2020: 42-48 - [c26]Jingcheng Yang, Haowei Ye, Futai Zou:
pyDNetTopic: A Framework for Uncovering What Darknet Market Users Talking About. SecureComm (1) 2020: 118-139 - [c25]Yuzong Hu, Futai Zou, Linsen Li, Ping Yi:
Traffic Classification of User Behaviors in Tor, I2P, ZeroNet, Freenet. TrustCom 2020: 418-424 - [i2]Chengwei Zhang, Yunlu Xu, Zhanzhan Cheng, Shiliang Pu, Yi Niu, Fei Wu, Futai Zou:
SPIN: Structure-Preserving Inner Offset Network for Scene Text Recognition. CoRR abs/2005.13117 (2020)
2010 – 2019
- 2019
- [j7]Kedi Wang, Ping Yi, Futai Zou, Yue Wu:
Generating Adversarial Samples With Constrained Wasserstein Distance. IEEE Access 7: 136812-136821 (2019) - [j6]Cheng Huang, Ping Yi, Futai Zou, Yao Yao, Wei Wang, Ting Zhu:
CCID: Cross-Correlation Identity Distinction Method for Detecting Shrew DDoS. Wirel. Commun. Mob. Comput. 2019: 6705347:1-6705347:9 (2019) - [c24]Tangda Yu, Futai Zou, Linsen Li, Ping Yi:
An Encrypted Malicious Traffic Detection System Based on Neural Network. CyberC 2019: 62-70 - [c23]Yue Bi, Yue Wu, Cunqing Hua, Futai Zou:
Evolutionary Anti-Jamming Game in Non-Orthogonal Multiple Access System. GLOBECOM 2019: 1-6 - [c22]Jiachen Zhu, Futai Zou:
Detecting Malicious Domains Using Modified SVM Model. HPCC/SmartCity/DSS 2019: 492-499 - [c21]Yongkang Jiang, Shenghong Li, Yue Wu, Futai Zou:
A Novel Image-Based Malware Classification Model Using Deep Learning. ICONIP (2) 2019: 150-161 - [c20]Chengwei Zhang, Yunlu Xu, Zhanzhan Cheng, Yi Niu, Shiliang Pu, Fei Wu, Futai Zou:
Adversarial Seeded Sequence Growing for Weakly-Supervised Temporal Action Localization. ACM Multimedia 2019: 738-746 - [i1]Chengwei Zhang, Yunlu Xu, Zhanzhan Cheng, Yi Niu, Shiliang Pu, Fei Wu, Futai Zou:
Adversarial Seeded Sequence Growing for Weakly-Supervised Temporal Action Localization. CoRR abs/1908.02422 (2019) - 2018
- [j5]Futai Zou, Linsen Li, Yue Wu, Jianhua Li, Siyu Zhang, Kaida Jiang:
Detecting Domain-Flux Malware Using DNS Failure Traffic. Int. J. Softw. Eng. Knowl. Eng. 28(2): 151-174 (2018) - [j4]Ping Yi, Yuxiang Guan, Futai Zou, Yao Yao, Wei Wang, Ting Zhu:
Web Phishing Detection Using a Deep Learning Framework. Wirel. Commun. Mob. Comput. 2018: 4678746:1-4678746:9 (2018) - [c19]Liang Fang, Guangtao Xue, Feng Lyu, Hao Sheng, Futai Zou, Minglu Li:
Intelligent Large-Scale AP Control with Remarkable Energy Saving in Campus WiFi System. ICPADS 2018: 69-76 - [c18]Boren He, Futai Zou, Yue Wu:
Multi-SDN Based Cooperation Scheme for DDoS Attack Defense. SSIC 2018: 1-7 - 2017
- [j3]Futai Zou, Siyu Zhang, Linsen Li, Li Pan, Jianhua Li:
Detecting malware based on expired command-and-control traffic. Int. J. Distributed Sens. Networks 13(7) (2017) - 2016
- [c17]Yechao Xia, Li Pan, Liang Shi, Futai Zou:
Attribute Credibility Based Sybil Goup Detection in Online Social Networks. DSC 2016: 358-363 - [c16]Futai Zou, Siyu Zhang, Bei Pei, Li Pan, Linsen Li, Jianhua Li:
Survey on Domain Name System Security. DSC 2016: 602-607 - [c15]Zihao Wang, Futai Zou, Bei Pei, Weijia He, Li Pan, Zhaochong Mao, Linsen Li:
Detecting Malicious Server Based on Server-to-Server Realation Graph. DSC 2016: 698-702 - 2015
- [j2]Futai Zou, Siyu Zhang, Weixiong Rao, Ping Yi:
Detecting Malware Based on DNS Graph Mining. Int. J. Distributed Sens. Networks 11: 102687:1-102687:12 (2015) - 2014
- [c14]Eric Ke Wang, Tsu-Yang Wu, Chien-Ming Chen, Yuming Ye, Zhujin Zhang, Futai Zou:
MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of Things. ICGEC 2014: 389-397 - 2012
- [c13]Jiaping Gui, Yue Wu, Chenji Pan, Futai Zou, Yifei Xie:
Cost based routing in delay tolerant networks. PIMRC 2012: 1084-1089 - 2010
- [c12]Jiacheng Hong, Ning Liu, Ping Yi, Futai Zou, Qiang Zhai:
Securing Wireless Mesh Network with Mobile Firewall. WCSP 2010: 1-6
2000 – 2009
- 2009
- [c11]Weixiong Rao, Lei Chen, Ada Wai-Chee Fu, Hanhua Chen, Futai Zou:
On Efficient Content Matching in Distributed Pub/Sub Systems. INFOCOM 2009: 756-764 - 2007
- [j1]Xinli Huang, Futai Zou, Fan-Yuan Ma:
Targeted Local Immunization in Scale-Free Peer-to-Peer Networks. J. Comput. Sci. Technol. 22(3): 457-468 (2007) - 2005
- [c10]Yin Li, Xinli Huang, Fanyuan Ma, Futai Zou:
Building Efficient Super-Peer Overlay Network for DHT Systems. GCC 2005: 787-798 - [c9]Yin Li, Xinli Huang, Futai Zou, Fanyuan Ma:
eDSR: A Decentralized Service Registry for e-Commerce. ICEBE 2005: 615-619 - 2004
- [c8]Yin Li, Futai Zou, Zengde Wu, Fanyuan Ma:
PWSD: A Scalable Web Service Discovery Architecture Based on Peer-to-Peer Overlay Network. APWeb 2004: 291-300 - [c7]Yin Li, Futai Zou, Fanyuan Ma, Minglu Li:
pXRepository: A Peer-to-Peer XML Repository for Web Service Discovery. GCC 2004: 137-144 - [c6]Futai Zou, Yin Li, Liang Zhang, Fanyuan Ma, Minglu Li:
A Novel Approach for Constructing Small World in Structured P2P Systems. GCC 2004: 807-810 - [c5]Futai Zou, Shudong Chen, Fanyuan Ma, Liang Zhang, Junjun Tang:
Using the Linking Model to Understand the Performance of DHT Routing Algorithms. ISPA 2004: 544-549 - [c4]Yin Li, Futai Zou, Fanyuan Ma, Minglu Li:
Build a Distributed Repository for Web Service Discovery Based on Peer-to-Peer Network. NPC 2004: 175-182 - [c3]Futai Zou, Yin Li, Liang Zhang, Fanyuan Ma:
CCAN: Cache-Based CAN Using the Small World Model. WAIM 2004: 167-175 - 2003
- [c2]Futai Zou, Liang Zhang, Yin Li, Fanyuan Ma:
Effect of Links on DHT Routing Algorithms. GCC (1) 2003: 308-315 - [c1]Shui Yu, Leyun Pan, Futai Zou, Fanyuan Ma:
DHCS: A Case of Knowledge Share in Cooperative Computing Environment. GCC (2) 2003: 380-387
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint