default search action
Huaifeng Bao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Huaifeng Bao, Wenhao Li
, Huashan Chen, Han Miao, Qiang Wang, Zixian Tang
, Feng Liu
, Wen Wang:
Stories behind decisions: Towards interpretable malware family classification with hierarchical attention. Comput. Secur. 144: 103943 (2024) - [c14]Wenhao Li
, Duohe Ma
, Zhaoxuan Li
, Huaifeng Bao
, Shuai Wang
, Huamin Jin
, Xiao-Yu Zhang
:
Poster: Towards Real-Time Intrusion Detection with Explainable AI-Based Detector. CCS 2024: 4934-4936 - [c13]Huaifeng Bao
, Wenhao Li
, Zhaoxuan Li
, Han Miao
, Wen Wang
, Feng Liu
:
Poster: PGPNet: Classify APT Malware Using Prediction-Guided Prototype Network. CCS 2024: 5063-5065 - [c12]Huaifeng Bao, Xingyu Wang, Wenhao Li, Jinpeng Xu, Peng Yin, Wen Wang, Feng Liu:
CAFE: Robust Detection of Malicious Macro based on Cross-modal Feature Extraction. CSCWD 2024: 2534-2540 - [c11]Xingyu Wang, Huaifeng Bao, Wenhao Li
, Haoning Chen, Wen Wang, Feng Liu:
A Framework for Intelligent Generation of Intrusion Detection Rules Based on Grad-CAM. ICCS (7) 2024: 147-161 - [c10]Xiaowei Hu, Haoning Chen, Huaifeng Bao, Wen Wang, Feng Liu, Guoqiao Zhou, Peng Yin:
A LLM-based agent for the automatic generation and generalization of IDS rules. TrustCom 2024: 1875-1880 - [i1]Wenhao Li, Qiang Wang, Huaifeng Bao, Xiao-Yu Zhang, Lingyun Ying, Zhaoxuan Li:
Magnifier: Detecting Network Access via Lightweight Traffic-based Fingerprints. CoRR abs/2412.13428 (2024) - 2023
- [j3]Wenhao Li
, Xiaoyu Zhang
, Huaifeng Bao
, Binbin Yang
, Zhaoxuan Li
, Haichao Shi
, Qiang Wang
:
Prism: Real-Time Privacy Protection Against Temporal Network Traffic Analyzers. IEEE Trans. Inf. Forensics Secur. 18: 2524-2537 (2023) - [j2]Wenhao Li
, Xiaoyu Zhang
, Huaifeng Bao
, Haichao Shi
, Qiang Wang
:
ProGraph: Robust Network Traffic Identification With Graph Propagation. IEEE/ACM Trans. Netw. 31(3): 1385-1399 (2023) - [c9]Shijia Li
, Jiang Ming
, Pengda Qiu
, Qiyuan Chen
, Lanqing Liu
, Huaifeng Bao
, Qiang Wang
, Chunfu Jia
:
PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection. CCS 2023: 3078-3092 - [c8]Huaifeng Bao, Wen Wang, Feng Liu:
Towards Open-Set APT Malware Classification under Few-Shot Setting. GLOBECOM 2023: 6844-6849 - [c7]Huaifeng Bao, Wenhao Li, Xingyu Wang, Zixian Tang, Qiang Wang, Wen Wang, Feng Liu:
Payload Level Graph Attention Network for Web Attack Traffic Detection. ICCS (5) 2023: 394-407 - [c6]Han Miao, Huaifeng Bao, Zixian Tang, Wenhao Li, Wen Wang, Huashan Chen, Feng Liu, Yanhui Sun:
AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection. SciSec 2023: 207-224 - 2022
- [j1]Wenhao Li
, Xiaoyu Zhang
, Huaifeng Bao, Qiang Wang
, Zhaoxuan Li:
Robust network traffic identification with graph matching. Comput. Networks 218: 109368 (2022) - [c5]Wenhao Li, Xiaoyu Zhang, Huaifeng Bao, Qiang Wang, Haichao Shi, Zhaoxuan Li:
A Glimpse of the Whole: Detecting Few-shot Android Malware Encrypted Network Traffic. HPCC/DSS/SmartCity/DependSys 2022: 635-644 - [c4]Wenhao Li, Huaifeng Bao, Xiaoyu Zhang, Lin Li:
AMDetector: Detecting Large-Scale and Novel Android Malware Traffic with Meta-learning. ICCS (4) 2022: 387-401 - [c3]Qiang Wang, Wenhao Li, Huaifeng Bao, Zixian Tang, Wen Wang, Feng Liu, Lingyun Ying:
High-Efficient and Few-shot Adaptive Encrypted Traffic Classification with Deep Tree. MILCOM 2022: 458-463 - 2021
- [c2]Zixian Tang, Qiang Wang, Wenhao Li, Huaifeng Bao, Feng Liu, Wen Wang:
HSLF: HTTP Header Sequence Based LSH Fingerprints for Application Traffic Classification. ICCS (1) 2021: 41-54 - [c1]Zixian Tang, Qiang Wang
, Wenhao Li, Huaifeng Bao, Feng Liu, Wen Wang:
Mining Trojan Detection Based on Multi-dimensional Static Features. SciSec 2021: 51-65
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-27 18:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint