


default search action
Xiaoyan Hu 0007
Person information
Other persons with the same name
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j32]Yan Chen, Xiaoyan Hu
, Xinghai Chen, Guang Cheng, Ruidong Li, Hua Wu
:
BTG-RF: Recognizing Douyin payment behaviors based on behavioral traffic graph analysis. Comput. Networks 269: 111385 (2025) - [j31]Jinfeng Chen, Hua Wu
, Xiaohui Wang, Suyue Wang
, Guang Cheng, Xiaoyan Hu:
IEA-DMS: An Interpretable feature-driven, Efficient and Accurate Detection Method for Slow HTTP DoS in high-speed networks. Comput. Secur. 150: 104291 (2025) - [j30]Ruiqi Huang, Hua Wu
, Xiaohui Wang, Guang Cheng, Xiaoyan Hu:
The secret behind instant messaging: video identification attack against complex protocols. Cybersecur. 8(1): 13 (2025) - [j29]Fuhao Yang, Hua Wu
, Xiangyu Zheng
, Jinfeng Chen, Xiaoyan Hu
, Jing Ren
:
A Detection Scheme for Multiplexed Asymmetric Workload DDoS Attacks in High-Speed Networks. IEEE Trans. Netw. Serv. Manag. 22(4): 3513-3527 (2025) - 2024
- [j28]Xiaoyan Hu
, Di Li, Miao Li, Guang Cheng
, Ruidong Li, Hua Wu
:
AHDom: Algorithmically generated domain detection using attribute heterogeneous graph neural network. Comput. Networks 254: 110770 (2024) - [j27]Suyue Wang
, Hua Wu
, Guang Cheng, Xiaoyan Hu
, Jing Ren
:
SD-MDN-TM: A traceback and mitigation integrated mechanism against DDoS attacks with IP spoofing. Comput. Networks 254: 110793 (2024) - [j26]Xiaoyan Hu, Meiqun Gui, Guang Cheng, Ruidong Li
, Hua Wu
:
Multi-class Bitcoin mixing service identification based on graph classification. Digit. Commun. Networks 10(6): 1881-1893 (2024) - [j25]Hua Wu
, Yujie Liu
, Guang Cheng
, Xiaoyan Hu
:
RT-CBCH: Real-Time VPN Traffic Service Identification Based on Sampled Data in High-Speed Networks. IEEE Trans. Netw. Serv. Manag. 21(1): 88-107 (2024) - [c51]Hangyu Zhao, Hua Wu, Xuqiong Bian, Songtao Liu, Guang Cheng, Xiaoyan Hu, Zhiyi Tian:
Unveiling the Unseen: Video Recognition Attacks on Social Software. ACISP (2) 2024: 412-432 - [c50]Ke Ding, Xia Zhou, Xiaoyan Hu, Guang Cheng, Ruidong Li, Hua Wu:
Enhancing Unknown Encrypted Traffic Clustering with Self-Supervised Learning. GLOBECOM 2024: 7-12 - [c49]Jingwen Quan, Jiajia Du, Hua Wu, Guang Cheng, Xiaoyan Hu:
Efficient Short Video Identification Attack for Scenarios with Hybrid Transmission Modes and Preloading Mechanism. MSN 2024: 504-511 - [c48]Yuanjie Zhao
, Hua Wu
, Liujinhan Chen
, Songtao Liu
, Guang Cheng
, Xiaoyan Hu
:
Identifying Video Resolution from Encrypted QUIC Streams in Segment-combined Transmission Scenarios. NOSSDAV 2024: 50-56 - 2023
- [j24]Hua Wu
, Ziling Shao, Fuhao Yang, Guang Cheng, Xiaoyan Hu, Jing Ren, Wei Wang
:
PD-CPS: A practical scheme for detecting covert port scans in high-speed networks. Comput. Networks 231: 109825 (2023) - [j23]Xiaoyan Hu, Zhuozhuo Shu
, Zhongqi Tong, Guang Cheng, Ruidong Li
, Hua Wu
:
Fine-grained Ethereum behavior identification via encrypted traffic analysis with serialized backward inference. Comput. Networks 237: 110110 (2023) - [j22]Hua Wu
, Weina Li, Xiying Chen, Guang Cheng, Xiaoyan Hu, Youqiong Zhuang
:
Batch classifier with adaptive update for backbone traffic classification. Comput. Commun. 202: 57-72 (2023) - [j21]Xiaoyan Hu
, Cheng Zhu
, Guang Cheng
, Ruidong Li
, Hua Wu, Jian Gong
:
A Deep Subdomain Adaptation Network With Attention Mechanism for Malware Variant Traffic Identification at an IoT Edge Gateway. IEEE Internet Things J. 10(5): 3814-3826 (2023) - [j20]Xiaoyan Hu, Weicheng Zhou, Jun Yin, Guang Cheng, Shen Yan, Hua Wu:
Towards verifiable and privacy-preserving account model on a consortium blockchain based on zk-SNARKs. Peer Peer Netw. Appl. 16(4): 1834-1851 (2023) - [j19]Xiaoyan Hu
, Hao Chen, Miao Li, Guang Cheng
, Ruidong Li
, Hua Wu
, Yali Yuan
:
ReplaceDGA: BiLSTM-Based Adversarial DGA With High Anti-Detection Ability. IEEE Trans. Inf. Forensics Secur. 18: 4406-4421 (2023) - [j18]Xiaoyan Hu
, Wenjie Gao, Guang Cheng
, Ruidong Li
, Yuyang Zhou
, Hua Wu
:
Toward Early and Accurate Network Intrusion Detection Using Graph Embedding. IEEE Trans. Inf. Forensics Secur. 18: 5817-5831 (2023) - [j17]Hua Wu
, Ya Liu, Shanshan Ni, Guang Cheng
, Xiaoyan Hu
:
LossDetection: Real-Time Packet Loss Monitoring System for Sampled Traffic Data. IEEE Trans. Netw. Serv. Manag. 20(1): 30-45 (2023) - [j16]Ziling Shao
, Tingzheng Chen
, Guang Cheng
, Xiaoyan Hu
, Weina Li
, Hua Wu
:
AF-FDS: An Accurate, Fast, and Fine-Grained Detection Scheme for DDoS Attacks in High-Speed Networks With Asymmetric Routing. IEEE Trans. Netw. Serv. Manag. 20(4): 4964-4981 (2023) - [j15]Hua Wu
, Xin Li
, Gang Wang
, Guang Cheng
, Xiaoyan Hu
:
Resolution Identification of Encrypted Video Streaming Based on HTTP/2 Features. ACM Trans. Multim. Comput. Commun. Appl. 19(2): 73:1-73:23 (2023) - [c47]Weiwei Zhu, Hua Wu, Jingwen Quan, Guang Cheng, Xiaoyan Hu:
Accurate Identification of Encrypted Videos in Asymmetric Routing Scenarios. APNOMS 2023: 310-313 - [c46]Xiaoyan Hu, Yuxin Shi, Guang Cheng, Ruidong Li, Hua Wu, Gang Wang:
Towards Early and Accurate IoT Device-Type Identification with Global Attention Mechanism. GLOBECOM 2023: 3445-3450 - [c45]Gang Wang, Hua Wu, Guang Cheng, Xiaoyan Hu, Yuxin Shi:
Website Fingerprinting with Packet Sampling: A More Realistic Approach in Real-World Networks. GLOBECOM 2023: 7103-7108 - [c44]Xiaoyan Hu, Boquan Lin, Guang Cheng, Ruidong Li, Hua Wu:
Detecting Cryptomining Traffic Over an Encrypted Proxy Based on K-S Test. ICC 2023: 3787-3792 - [c43]Xiaoyan Hu, Ning Li, Guang Cheng, Ruidong Li, Hua Wu:
A Novel Darknet Traffic Classification Method Based on Knowledge Graph with Dynamic Embedding Learning. ICC 2023: 3799-3804 - [c42]Shiyue Liu, Hua Wu, Guang Cheng, Xiaoyan Hu:
Real-Time Phishing Detection Based on URL Multi-Perspective Features: Aiming at the Real Web Environment. ICC 2023: 3811-3816 - [c41]Zhaoxu Ge, Hua Wu, Guang Cheng, Xiaoyan Hu:
NFlowGAN: High-Utility Privacy-Preserving Network Flow Synthesis Based on GAN. ICC 2023: 4057-4062 - [c40]Jinfeng Chen, Hua Wu, Suyue Wang
, Guang Cheng, Xiaoyan Hu:
An Accurate and Real-Time Detection Method for Concealed Slow HTTP DoS in Backbone Network. SEC 2023: 207-221 - [c39]Anting Lu, Hua Wu, Hao Luo, Guang Cheng, Xiaoyan Hu:
Real-Time Platform Identification of VPN Video Streaming Based on Side-Channel Attack. SEC 2023: 335-349 - [c38]Songtao Liu, Hua Wu, Hao Luo, Guang Cheng, Xiaoyan Hu:
A Stable Fine-Grained Webpage Fingerprinting: Aiming at the Unstable Realistic Network. SecureComm (2) 2023: 167-188 - 2022
- [j14]Xiaoyan Hu, Xiaoyi Song, Guang Cheng, Hua Wu, Jian Gong:
Efficient sharing of privacy-preserving sensing data on consortium blockchain via group key agreement. Comput. Commun. 194: 44-54 (2022) - [j13]Xiaoyan Hu
, Cheng Zhu, Zhongqi Tong, Wenjie Gao, Guang Cheng
, Ruidong Li
, Hua Wu, Jian Gong:
Identifying Ethereum traffic based on an active node library and DEVp2p features. Future Gener. Comput. Syst. 132: 162-177 (2022) - [c37]Hua Wu, Yuping Sui, Guang Cheng, Xiaoyan Hu, Qinghua Shang:
Service classification of high-speed network traffic based on Two-Stage Clustering. APNOMS 2022: 1-6 - [c36]Youqiong Zhuang, Hua Wu, Songtao Liu, Guang Cheng, Xiaoyan Hu:
HDS: A Hierarchical Scheme for Accurate and Efficient DDoS Flooding Attack Detection. APNOMS 2022: 1-6 - [c35]Xiaoyan Hu, Yishu Gao, Guang Cheng, Hua Wu, Ruidong Li
:
An Adversarial Learning-based Tor Malware Traffic Detection Model. GLOBECOM 2022: 74-79 - [c34]Xiaoyan Hu, Yuelin Hu, Guang Cheng, Hua Wu, Yifei Qin, Jian Gong:
A Dynamic Access Control Model Based on Attributes and Intro VAE. GLOBECOM 2022: 1379-1384 - [c33]Hua Wu, Ziling Shao, Guang Cheng, Xiaoyan Hu, Jing Ren, Wei Wang
:
Detecting Slow Port Scans of Long Duration in High-Speed Networks. GLOBECOM 2022: 3405-3410 - [c32]Xiaoyan Hu, Miao Li, Guang Cheng, Ruidong Li
, Hua Wu, Jian Gong:
Towards Accurate DGA Detection based on Siamese Network with Insufficient Training Samples. ICC 2022: 2670-2675 - [c31]Hua Wu, Xuange Zhang, Tingzheng Chen, Guang Cheng, Xiaoyan Hu:
IM-Shield: A Novel Defense System against DDoS Attacks under IP Spoofing in High-speed Networks. ICC 2022: 4168-4173 - [c30]Hua Wu, Yujie Liu, Guang Cheng, Xiaoyan Hu:
Real-time Identification of VPN Traffic based on Counting Bloom Filter and Chained Hash Table from Sampled Data in High-speed Networks. ICC 2022: 5070-5075 - [c29]Hua Wu, Chengfei Zhu, Guang Cheng, Xiaoyan Hu:
Real-time Application Identification of RTC Media Streams via Encrypted Traffic Analysis. ICCCN 2022: 1-10 - [c28]Hua Wu, Chaoqun Cui, Guang Cheng, Xiaoyan Hu:
PSCM: Towards Practical Encrypted Unknown Protocol Classification. ISCC 2022: 1-6 - [c27]Hua Wu, Xingmeng Fan, Guang Cheng, Xiaoyan Hu:
Identify IoT Devices from Backbone Networks Using Lightweight Neural Networks. LCN 2022: 140-148 - [c26]Hua Wu, Rui Wang, Guang Cheng, Xiaoyan Hu:
Service-Based Identification of Highly Coupled Mobile Applications. LCN 2022: 279-282 - [c25]Xiaoyan Hu, Jun Yin, Guang Cheng, Jian Gong, Lu Yang, Honggang Chen, Zhichao Liang:
Verifying Privacy-Preserving Financing Orders on a Consortium Blockchain Based on zk-SNARKs. WCNC 2022: 1527-1532 - 2021
- [j12]Xiaoyan Hu
, Zechen Wang, Xiangjun Liu, Xinran Li, Guang Cheng, Jian Gong:
Exploring real-time super-resolution generative adversarial networks. Int. J. Sens. Networks 36(2): 85-96 (2021) - [j11]Hua Wu
, Qiuyan Wu, Guang Cheng, Shuyi Guo, Xiaoyan Hu
, Shen Yan
:
SFIM: Identify user behavior based on stable features. Peer-to-Peer Netw. Appl. 14(6): 3674-3687 (2021) - [c24]Xiaoyan Hu, Zhuozhuo Shu, Xiaoyi Song, Guang Cheng, Jian Gong:
Detecting Cryptojacking Traffic Based on Network Behavior Features. GLOBECOM 2021: 1-6 - [c23]Hua Wu, Tingzheng Chen, Ziling Shao, Guang Cheng, Xiaoyan Hu:
Accurate and Fast Detection of DDoS Attacks in High-Speed Network with Asymmetric Routing. GLOBECOM 2021: 1-6 - [c22]Hua Wu
, Lu Wang, Guang Cheng, Xiaoyan Hu
:
Mobile Application Encryption Traffic Classification Based On TLS Flow Sequence Network. ICC Workshops 2021: 1-6 - [c21]Hua Wu
, Xin Li, Guang Cheng, Xiaoyan Hu
:
Monitoring Video Resolution of Adaptive Encrypted Video Traffic Based on HTTP/2 Features. INFOCOM Workshops 2021: 1-6 - [c20]Hua Wu
, Ya Liu, Guang Cheng, Xiaoyan Hu
:
Real-time Packet Loss Detection for TCP and UDP Based on Feature-Sketch. INFOCOM Workshops 2021: 1-6 - [c19]Hua Wu
, Xiying Chen, Guang Cheng, Xiaoyan Hu
, Youqiong Zhuang:
BCAC: Batch Classifier based on Agglomerative Clustering for traffic classification in a backbone network. IWQoS 2021: 1-10 - [c18]Xiaoyan Hu, Xiaoyi Song, Guang Cheng, Jian Gong, Lu Yang, Honggang Chen, Zhichao Liang:
Towards Efficient Co-audit of Privacy-Preserving Data on Consortium Blockchain via Group Key Agreement. MSN 2021: 494-501 - 2020
- [j10]Yuwei Xu
, Shuai Tong
, Tiantian Zhang
, Wen Sun
, Xiaoyan Hu
, Qiao Xiang
:
COMPASS: Directing Named Data Transmission in VANETs by Dynamic Directional Interfaces. IEEE Access 8: 8418-8435 (2020) - [j9]Xiaoyan Hu
, Shaoqi Zheng, Guoqiang Zhang, Lixia Zhao, Guang Cheng, Jian Gong, Ruidong Li
:
An on-demand off-path cache exploration based multipath forwarding strategy. Comput. Networks 166 (2020) - [j8]Guang Cheng
, Lixia Zhao, Xiaoyan Hu
, Shaoqi Zheng, Hua Wu
, Chengyu Fan:
A network-wide view-based detection and mitigation of a sophisticated Interest Flooding Attack. EURASIP J. Wirel. Commun. Netw. 2020(1): 144 (2020) - [c17]Xiaoyan Hu
, Xiaoyi Song, Shaoqi Zheng, Ruidong Li
, Guang Cheng, Jian Gong:
Towards Network Coding and Request Pipelining Enabled NDN for Big Data Transmission. GLOBECOM 2020: 1-6 - [c16]Xiaoyan Hu
, Jun Yin, Shaoqi Zheng, Ruidong Li
, Guang Cheng, Jian Gong:
A Demand and Responsiveness-based Caching Strategy for Network Coding Enabled NDN. GLOBECOM 2020: 1-6
2010 – 2019
- 2019
- [j7]Jie Xu
, Wei Ding, Qiushi Gong, Xiaoyan Hu
, Haiqing Yu:
A Super Point Detection Algorithm Under Sliding Time Windows Based on Rough and Linear Estimators. IEEE Access 7: 43414-43427 (2019) - [j6]Xiaodong Zang
, Jian Gong, Xiaoyan Hu
:
An Adaptive Profile-Based Approach for Detecting Anomalous Traffic in Backbone. IEEE Access 7: 56920-56934 (2019) - [j5]Jie Xu, Wei Ding, Xiaoyan Hu
, Qiushi Gong:
VATE: A trade-off between memory and preserving time for high accurate cardinality estimation under sliding time window. Comput. Commun. 138: 20-31 (2019) - [c15]Xiaoyan Hu
, Xiangjun Liu, Zechen Wang, Xinran Li, Wenqiang Peng, Guang Cheng:
RTSRGAN: Real-Time Super-Resolution Generative Adversarial Networks. CBD 2019: 321-326 - [c14]Xiaoyan Hu
, Shaoqi Zheng, Jian Gong, Guang Cheng, Guoqiang Zhang, Ruidong Li
:
Enabling Linearly Homomorphic Signatures in Network Coding-based Named Data Networking. CFI 2019: 2:1-2:4 - [c13]Hua Wu
, Guang Cheng, Xiaoyan Hu
:
Inferring ADU Combinations from Encrypted QUIC Stream. CFI 2019: 4:1-4:6 - [c12]Guang Cheng, Lixia Zhao, Xiaoyan Hu
, Shaoqi Zheng, Hua Wu
, Ruidong Li
, Chengyu Fan:
Detecting and Mitigating A Sophisticated Interest Flooding Attack in NDN from the Network-Wide View. NMIC@ICDCS 2019: 7-12 - [c11]Xiaoyan Hu
, Shaoqi Zheng, Lixia Zhao, Guang Cheng, Jian Gong:
Exploration and Exploitation of Off-path Cached Content in Network Coding Enabled Named Data Networking. ICNP 2019: 1-6 - [i4]Jie Xu, Wei Ding, Xiaoyan Hu:
GPU based Real-time Super Hosts Detection at Distributed Edge Routers. CoRR abs/1901.06207 (2019) - [i3]Jie Xu, Wei Ding, Xiaoyan Hu:
Most memory efficient distributed super points detection on core networks. CoRR abs/1901.07306 (2019) - 2018
- [j4]Xiaoyan Hu
, Jian Gong, Guang Cheng, Guoqiang Zhang, Chengyu Fan:
Mitigating Content Poisoning With Name-Key Based Forwarding and Multipath Forwarding Based Inband Probe for Energy Management in Smart Cities. IEEE Access 6: 39692-39704 (2018) - [c10]Jie Xu, Wei Ding, Jian Gong, Xiaoyan Hu
, Shaobo Sun:
SRLA: A Real Time Sliding Time Window Super Point Cardinality Estimation Algorithm for High Speed Network Based on GPU. HPCC/SmartCity/DSS 2018: 942-947 - [c9]Jie Xu, Wei Ding, Xiaoyan Hu
:
Most Memory Efficient Distributed Super Points Detection on Core Networks. ICA3PP (1) 2018: 153-167 - [c8]Jie Xu, Wei Ding, Xiaoyan Hu
:
Abnormal Hosts Monitor for City Wide Core Network by Real Time Super Points Cardinality Estimation. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 627-634 - [i2]Jie Xu, Wei Ding, Xiaoyan Hu:
SRLA: A real time sliding time window super point cardinality estimation algorithm for high speed network based on GPU. CoRR abs/1803.10369 (2018) - [i1]Jie Xu, Wei Ding, Xiaoyan Hu:
VATE: a trade-off between memory and preserving time for high accuracy cardinalities estimation under sliding time window. CoRR abs/1812.00282 (2018) - 2017
- [c7]Jie Xu, Wei Ding, Jian Gong, Xiaoyan Hu
, Jie Liu:
High Speed Network Super Points Detection Based on Sliding Time Window by GPU. ISPA/IUCC 2017: 566-573 - 2016
- [j3]Ahmad Jakalan
, Jian Gong, Qi Su, Xiaoyan Hu
, Abdeldime M. S. Abdelgader
:
Social relationship discovery of IP addresses in the managed IP networks by observing traffic at network boundary. Comput. Networks 100: 12-27 (2016) - [c6]Xiaoyan Hu
, Jian Gong:
Enabling Fast Recovery from Unanticipated Data Access Failure in Named Data Networking. CFI 2016: 109-112 - 2015
- [j2]Qi Su, Jian Gong, Xiaoyan Hu
:
RTT Estimation with Sampled Flow Data. IEICE Trans. Commun. 98-B(9): 1848-1857 (2015) - [c5]Xiaoyan Hu
, Jian Gong, Guang Cheng, Chengyu Fan:
Enhancing in-network caching by coupling cache placement, replacement and location. ICC 2015: 5672-5678 - 2014
- [j1]Xiaoyan Hu
, Jian Gong:
Opportunistic On-Path Caching for Named Data Networking. IEICE Trans. Commun. 97-B(11): 2360-2367 (2014) - [c4]Xiaoyan Hu
, Jian Gong:
CANR: Cache-Aware Name-based Routing. CCIS 2014: 212-217 - 2013
- [c3]Xiaoyan Hu
, Christos Papadopoulos, Jian Gong, Daniel Massey:
Not So Cooperative Caching in Named Data Networking. GLOBECOM 2013: 2263-2268 - [c2]Xiaoyan Hu
, Jian Gong:
PhD forum: Not so cooperative caching. ICNP 2013: 1-3 - 2012
- [c1]Xiaoyan Hu
, Jian Gong:
Distributed in-network cooperative caching. CCIS 2012: 735-740
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-09-28 21:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint