​
Login / Signup
Zhenyu Cheng
ORCID
Publication Activity (10 Years)
Years Active: 2017-2024
Publications (10 Years): 21
Top Topics
Attention Mechanism
Malicious Traffic
Highly Relevant
Pattern Recognition
Top Venues
ICC
ICCS (1)
CollaborateCom
ICASSP
</>
Publications
</>
Ziang Li
,
Chengxiang Si
,
Zhenyu Cheng
,
Shuyuan Zhao
,
Yong Ding
MLMTD: A Multi-Layer Malicious Traffic Detection Model Based on Multi-Branch Octave Convolution and Attention Mechanism.
ICASSP
(2024)
Peishuai Sun
,
Chengxiang Si
,
Shuhao Li
,
Zhenyu Cheng
,
Shuyuan Zhao
,
Qingyun Liu
A Targeted Adversarial Attack Method for Multi-Classification Malicious Traffic Detection.
ICASSP
(2024)
Ziang Li
,
Jie Xu
,
Zhenyu Cheng
,
Tianning Zang
IMTCDF: A Multi-Module-Based Internet Malicious Traffic Classification and Detection Framework.
CSCWD
(2024)
Ziang Li
,
Zhenyu Cheng
,
Tianning Zang
,
Yijie Li
MTCD-Model: A Two-Layer Model for Malicious Traffic Classification and Detection Based on Hierarchical Feature Learning.
IJCNN
(2023)
Changbo Tian
,
Shuyuan Zhao
,
Zhenyu Cheng
AntCom: An effective and efficient anti-tracking system with dynamic and asymmetric communication channel.
J. Netw. Comput. Appl.
218 (2023)
Ziang Li
,
Yafei Sang
,
Zhenyu Cheng
,
Tianning Zang
,
Shuyuan Zhao
,
Han Wang
TCCN: A Network Traffic Classification and Detection Model Based on Capsule Network.
ICC
(2023)
Peishuai Sun
,
Shuhao Li
,
Jiang Xie
,
Hongbo Xu
,
Zhenyu Cheng
,
Rong Yang
GPMT: Generating practical malicious traffic based on adversarial attacks with little prior knowledge.
Comput. Secur.
130 (2023)
Hongbo Xu
,
Shuhao Li
,
Zhenyu Cheng
,
Rui Qin
,
Jiang Xie
,
Peishuai Sun
VT-GAT: A Novel VPN Encrypted Traffic Classification Model Based on Graph Attention Neural Network.
CollaborateCom (2)
(2022)
Zhenyu Cheng
,
Xiaochun Yun
,
Shuhao Li
,
Jinbu Geng
,
Rui Qin
,
Li Fan
DITA-NCG: Detecting Information Theft Attack Based on Node Communication Graph.
ICCS (1)
(2022)
Peishuai Sun
,
Shuhao Li
,
Jiang Xie
,
Hongbo Xu
,
Zhenyu Cheng
,
Rui Qin
RAAM: A Restricted Adversarial Attack Model with Adding Perturbations to Traffic Features.
SEC
(2022)
Hongbo Xu
,
Shuhao Li
,
Zhenyu Cheng
,
Rui Qin
,
Jiang Xie
,
Peishuai Sun
TrafficGCN: Mobile Application Encrypted Traffic Classification Based on GCN.
GLOBECOM
(2022)
Jinbu Geng
,
Shuhao Li
,
Zhicheng Liu
,
Zhenyu Cheng
,
Li Fan
Effective Malicious URL Detection by Using Generative Adversarial Networks.
ICWE
(2022)
Jinbu Geng
,
Zhenyu Cheng
,
Zhicheng Liu
,
Shuhao Li
,
Rui Qin
HNOP: Attack Traffic Detection Based on Hierarchical Node Hopping Features of Packets.
ICCS (1)
(2022)
Jinbu Geng
,
Shuhao Li
,
Yongzheng Zhang
,
Zhicheng Liu
,
Zhenyu Cheng
LIFH: Learning Interactive Features from HTTP Payload using Image Reconstruction.
ICC
(2021)
Zhicheng Liu
,
Shuhao Li
,
Yongzheng Zhang
,
Xiaochun Yun
,
Zhenyu Cheng
Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks.
ISCC
(2020)
Zhenyu Cheng
,
Xunxun Chen
,
Yongzheng Zhang
,
Shuhao Li
,
Jian Xu
MURITE-Detector: Identifying User-Role in Information Theft Events of Mobile Network.
TrustCom/BigDataSE
(2019)
Jian Xu
,
Xiaochun Yun
,
Yongzheng Zhang
,
Zhenyu Cheng
Important Member Discovery of Attribution Trace Based on Relevant Circle (Short Paper).
CollaborateCom
(2018)
Zhenyu Cheng
,
Xunxun Chen
,
Yongzheng Zhang
,
Shuhao Li
,
Jian Xu
MUI-defender: CNN-Driven, Network Flow-Based Information Theft Detection for Mobile Users.
CollaborateCom
(2018)
Jian Xu
,
Xiaochun Yun
,
Yongzheng Zhang
,
Zhenyu Cheng
Community Discovery of Attribution Trace Based on Deep Learning Approach.
ICICS
(2018)
Jian Xu
,
Xiaochun Yun
,
Yongzheng Zhang
,
Yafei Sang
,
Zhenyu Cheng
NetworkTrace: Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis.
TrustCom/BigDataSE/ICESS
(2017)
Zhenyu Cheng
,
Xunxun Chen
,
Yongzheng Zhang
,
Shuhao Li
,
Yafei Sang
Detecting Information Theft Based on Mobile Network Flows for Android Users.
NAS
(2017)