


Остановите войну!
for scientists:


default search action
Tianning Zang
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c25]Songhao Jiang, Yan Chu, Zhengkui Wang, Tianxing Ma, Hanlin Wang, Wenxuan Lu, Tianning Zang, Bo Wang:
Explainable Text Classification via Attentive and Targeted Mixing Data Augmentation. IJCAI 2023: 5085-5094 - [c24]Ziang Li, Zhenyu Cheng, Tianning Zang, Yijie Li:
MTCD-Model: A Two-Layer Model for Malicious Traffic Classification and Detection Based on Hierarchical Feature Learning. IJCNN 2023: 1-8 - [c23]Xiang Li, Beibei Feng, Tianning Zang, Xiaolin Xu, Shuyuan Zhao, Jingrun Ma:
Facing Unknown: Open-World Encrypted Traffic Classification Based on Contrastive Pre-Training. ISCC 2023: 1255-1260 - [i2]Xiang Li, Beibei Feng, Tianning Zang, Shuyuan Zhao, Jingrun Ma:
Facing Unknown: Open-World Encrypted Traffic Classification Based on Contrastive Pre-Training. CoRR abs/2308.16861 (2023) - 2022
- [j5]Yuwei Zeng
, Zhicheng Liu, Xunxun Chen, Tianning Zang:
Hidden Path: Understanding the Intermediary in Malicious Redirections. IEEE Trans. Inf. Forensics Secur. 17: 1725-1740 (2022) - [c22]Jian Han, Zhonghua Wang, Songhao Jiang, Tianning Zang:
Malicious Blockchain Domain Detection Based on Heterogeneous Information Network. GLOBECOM 2022: 2597-2602 - [c21]Qian Qiang, Yige Chen, Yang Hu, Tianning Zang, Mian Cheng, Quanbo Pan, Yu Ding, Zisen Qi:
Cost-Effective Malware Classification Based on Deep Active Learning. SecureComm 2022: 212-227 - [i1]Songhao Jiang, Yan Chu, Tianxing Ma, Tianning Zang:
Feature Weaken: Vicinal Data Augmentation for Classification. CoRR abs/2211.10944 (2022) - 2021
- [j4]Yuwei Zeng
, Xiaochun Yun, Xunxun Chen, Boquan Li, Haiwei Tsang, Yipeng Wang, Tianning Zang, Yongzheng Zhang:
Finding disposable domain names: A linguistics-based stacking approach. Comput. Networks 184: 107642 (2021) - [c20]Yige Chen, Tianning Zang, Yongzheng Zhang, Yuan Zhou, Peng Yang:
Mobile Encrypted Traffic Classification Based on Message Type Inference. CollaborateCom (1) 2021: 117-137 - [c19]Yige Chen, Tianning Zang, Yongzheng Zhang, Yuan Zhou, Peng Yang, Yipeng Wang:
Inspector: A Semantics-Driven Approach to Automatic Protocol Reverse Engineering. CollaborateCom (1) 2021: 348-367 - [c18]Yige Chen, Tianning Zang, Yongzheng Zhang, Yuan Zhou, Linshu Ouyang, Peng Yang:
Incremental Learning for Mobile Encrypted Traffic Classification. ICC 2021: 1-6 - [c17]Yuwei Zeng
, Xunxun Chen, Tianning Zang, Haiwei Tsang:
Winding Path: Characterizing the Malicious Redirection in Squatting Domain Names. PAM 2021: 93-107 - 2020
- [j3]Xiaochun Yun, Ji Huang
, Yipeng Wang
, Tianning Zang, Yuan Zhou, Yongzheng Zhang:
Khaos: An Adversarial Neural Network DGA With High Anti-Detection Ability. IEEE Trans. Inf. Forensics Secur. 15: 2225-2240 (2020) - [c16]Chen Zhao, Yongzheng Zhang, Tianning Zang, Yige Chen, Yipeng Wang:
A Multi-feature-based Approach to Malicious Domain Name Identification from DNS Traffic. ICT 2020: 1-5 - [c15]Zhangrong Huang, Ji Huang, Tianning Zang:
Leopard: Understanding the Threat of Blockchain Domain Name Based Malware. PAM 2020: 55-70 - [c14]Zhizhou Liang, Tianning Zang, Yuwei Zeng
:
MalPortrait: Sketch Malicious Domain Portraits Based on Passive DNS Data. WCNC 2020: 1-8
2010 – 2019
- 2019
- [c13]Dunsheng Yuan, Ying Xiong, Tianning Zang, Ji Huang:
Nemesis: Detecting Algorithmically Generated Domains with an LSTM Language Model. CollaborateCom 2019: 350-363 - [c12]Dingkui Yan, Huilin Zhang, Yipeng Wang, Tianning Zang, Xiaolin Xu, Yuwei Zeng
:
Pontus: A Linguistics-Based DGA Detection System. GLOBECOM 2019: 1-6 - [c11]Yuwei Zeng
, Tianning Zang, Yongzheng Zhang, Xunxun Chen
, Yipeng Wang:
A Comprehensive Measurement Study of Domain-Squatting Abuse. ICC 2019: 1-6 - [c10]Yige Chen, Tianning Zang, Yongzheng Zhang, Yuan Zhou, Yipeng Wang:
Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach. ICNP 2019: 1-11 - [c9]Yuwei Zeng
, Yongzheng Zhang, Tianning Zang, Xunxun Chen
, Yipeng Wang:
A Linguistics-based Stacking Approach to Disposable Domains Detection. ICNP 2019: 1-4 - [c8]Chaoyi Zheng, Qian Qiang, Tianning Zang, Wenhan Chao, Yuan Zhou:
Themis: A Novel Detection Approach for Detecting Mixed Algorithmically Generated Domains. MSN 2019: 259-264 - 2018
- [j2]Miao Yu
, Yongzheng Zhang
, Tianning Zang, Yipeng Wang, Yijing Wang:
Information Propagation Prediction Based on Key Users Authentication in Microblogging. Secur. Commun. Networks 2018: 7024842:1-7024842:7 (2018) - [c7]Chen Zhao, Yongzheng Zhang, Tianning Zang, Zhizhou Liang, Yipeng Wang:
A Stacking Approach to Objectionable-Related Domain Names Identification by Passive DNS Traffic (Short Paper). CollaborateCom 2018: 284-294 - [c6]Wenbo Wang, Tianning Zang, Yuqing Lan:
The Rapid Extraction of Suspicious Traffic from Passive DNS. ICISSP 2018: 190-198 - [c5]Ji Huang, Pei Wang, Tianning Zang, Qian Qiang, Yipeng Wang, Miao Yu:
Detecting Domain Generation Algorithms with Convolutional Neural Language Models. TrustCom/BigDataSE 2018: 1360-1367 - 2017
- [j1]Yipeng Wang, Xiaochun Yun, Yongzheng Zhang, Liwei Chen, Tianning Zang:
Rethinking robust and accurate application protocol identification. Comput. Networks 129: 64-78 (2017) - 2014
- [c4]Lulu Zhang, Yongzheng Zhang, Tianning Zang:
Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-Coupled Payloads Filtering Scheme. SecureComm (1) 2014: 454-462 - 2011
- [c3]Xiang Cui, Binxing Fang, Lihua Yin, Xiaoyi Liu, Tianning Zang:
Andbot: Towards Advanced Mobile Botnets. LEET 2011 - 2010
- [c2]Tianning Zang, Xiao-chun Yun, Tianyi Zang, Yongzheng Zhang, Chaoguang Men:
Cooperative Work Systems for the Security of Digital Computing Infrastructure. ICPADS 2010: 676-681
2000 – 2009
- 2008
- [c1]Tianning Zang, Xiao-chun Yun, Yongzheng Zhang:
A Survey of Alert Fusion Techniques for Security Incident. WAIM 2008: 475-481
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-09-27 22:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint