​
Login / Signup
Peishuai Sun
ORCID
Publication Activity (10 Years)
Years Active: 2022-2024
Publications (10 Years): 10
Top Topics
Classification Accuracy
Feature Extraction
Network Attacks
Detection Mechanism
Top Venues
Comput. Secur.
CoRR
ICASSP
SciSec
</>
Publications
</>
Peishuai Sun
,
Chengxiang Si
,
Shuhao Li
,
Zhenyu Cheng
,
Shuyuan Zhao
,
Qingyun Liu
A Targeted Adversarial Attack Method for Multi-Classification Malicious Traffic Detection.
ICASSP
(2024)
Xiaochun Yun
,
Jiang Xie
,
Shuhao Li
,
Yongzheng Zhang
,
Peishuai Sun
Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features.
CoRR
(2023)
Jiang Xie
,
Shuhao Li
,
Yongzheng Zhanga
,
Peishuai Sun
,
Hongbo Xu
Analysis and Detection against Network Attacks in the Overlapping Phenomenon of Behavior Attribute.
CoRR
(2023)
Peishuai Sun
,
Shuhao Li
,
Jiang Xie
,
Hongbo Xu
,
Zhenyu Cheng
,
Rong Yang
GPMT: Generating practical malicious traffic based on adversarial attacks with little prior knowledge.
Comput. Secur.
130 (2023)
Jiang Xie
,
Shuhao Li
,
Peishuai Sun
Analysis and Detection Against Overlapping Phenomenon of Behavioral Attribute in Network Attacks.
SciSec
(2022)
Hongbo Xu
,
Shuhao Li
,
Zhenyu Cheng
,
Rui Qin
,
Jiang Xie
,
Peishuai Sun
VT-GAT: A Novel VPN Encrypted Traffic Classification Model Based on Graph Attention Neural Network.
CollaborateCom (2)
(2022)
Peishuai Sun
,
Shuhao Li
,
Jiang Xie
,
Hongbo Xu
,
Zhenyu Cheng
,
Rui Qin
RAAM: A Restricted Adversarial Attack Model with Adding Perturbations to Traffic Features.
SEC
(2022)
Hongbo Xu
,
Shuhao Li
,
Zhenyu Cheng
,
Rui Qin
,
Jiang Xie
,
Peishuai Sun
TrafficGCN: Mobile Application Encrypted Traffic Classification Based on GCN.
GLOBECOM
(2022)
Xiaochun Yun
,
Jiang Xie
,
Shuhao Li
,
Yongzheng Zhang
,
Peishuai Sun
Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features.
Comput. Secur.
121 (2022)
Jiang Xie
,
Shuhao Li
,
Yongzheng Zhang
,
Peishuai Sun
,
Hongbo Xu
Analysis and Detection against Network Attacks in the Overlapping Phenomenon of Behavior Attribute.
Comput. Secur.
121 (2022)