What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Guang Cheng
Google Scholar
20
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
DeMarking: A defense for network flow watermarking in real-time.
Yali Yuan
Jian Ge
Guang Cheng
2025
journals/compsec
IEA-DMS: An Interpretable feature-driven, Efficient and Accurate Detection Method for Slow HTTP DoS in high-speed networks.
Jinfeng Chen
Hua Wu
Xiaohui Wang
Suyue Wang
Guang Cheng
Xiaoyan Hu
2025
journals/tifs
A Lightweight and Dynamic Open-Set Intrusion Detection for Industrial Internet of Things.
Xueji Yang
Fei Tong
Fang Jiang
Guang Cheng
2025
journals/tifs
SCSGuardian: A Practical Hardware Defense Against Speculative Cache Side-Channel Attacks.
Xiaoyu Cheng
Fei Tong
Zhe Zhou
Fang Jiang
Hongyu Wang
Guang Cheng
Yuxing Mao
2025
journals/compsec
Attack smarter: Attention-driven fine-grained webpage fingerprinting attacks.
Yali Yuan
Weiyi Zou
Guang Cheng
2025
journals/tifs
sBugChecker: A Systematic Framework for Detecting Solidity Compiler-Introduced Bugs.
Fei Tong
Zihao Li
Guang Cheng
Yujian Zhang
Heng Li
2025
conf/icics
TetheGAN: A GAN-Based Synthetic Mobile Tethering Traffic Generating Framework.
Xuman Zhang
Guang Cheng
Li Deng
2024
journals/tifs
MTDroid: A Moving Target Defense-Based Android Malware Detector Against Evasion Attacks.
Yuyang Zhou
Guang Cheng
Shui Yu
Zongyao Chen
Yujia Hu
2024
conf/acisp
ProfistMAC: A Protocol Finite State Machine Classifier via Graph Representation.
Yali Yuan
Yichao Wang
Guang Cheng
2024
conf/acisp
Unveiling the Unseen: Video Recognition Attacks on Social Software.
Hangyu Zhao
Hua Wu
Xuqiong Bian
Songtao Liu
Guang Cheng
Xiaoyan Hu
Zhiyi Tian
2024
conf/esorics
Breaking Through the Diversity: Encrypted Video Identification Attack Based on QUIC Features.
Nan Hu
Hua Wu
Hangyu Zhao
Shanshan Ni
Guang Cheng
2024
conf/icics
TorHunter: A Lightweight Method for Efficient Identification of Obfuscated Tor Traffic Through Unsupervised Pre-training.
Yuwei Xu
Zhengxin Xu
Jie Cao
Rongrong Wang
Yali Yuan
Guang Cheng
2023
journals/tifs
ReplaceDGA: BiLSTM-Based Adversarial DGA With High Anti-Detection Ability.
Xiaoyan Hu
Hao Chen
Miao Li
Guang Cheng
Ruidong Li
Hua Wu
Yali Yuan
2023
journals/tifs
Toward Early and Accurate Network Intrusion Detection Using Graph Embedding.
Xiaoyan Hu
Wenjie Gao
Guang Cheng
Ruidong Li
Yuyang Zhou
Hua Wu
2023
journals/tifs
SINT: Toward a Blockchain-Based Secure In-Band Network Telemetry Architecture.
Yuyu Zhao
Guang Cheng
Yongning Tang
2023
conf/sec
An Accurate and Real-Time Detection Method for Concealed Slow HTTP DoS in Backbone Network.
Jinfeng Chen
Hua Wu
Suyue Wang
Guang Cheng
Xiaoyan Hu
2023
conf/sec
Real-Time Platform Identification of VPN Video Streaming Based on Side-Channel Attack.
Anting Lu
Hua Wu
Hao Luo
Guang Cheng
Xiaoyan Hu
2021
journals/tifs
An SDN-Enabled Proactive Defense Framework for DDoS Mitigation in IoT Networks.
Yuyang Zhou
Guang Cheng
Shui Yu
2020
journals/compsec
Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processes.
Yuyang Zhou
Guang Cheng
Shanqing Jiang
Yuyu Zhao
Zihan Chen
2019
conf/ccs
A Cost-effective Shuffling Method against DDoS Attacks using Moving Target Defense.
Yuyang Zhou
Guang Cheng
Shanqing Jiang
Ying Hu
Yuyu Zhao
Zihan Chen
Coauthors
Anting Lu
(1)
Fang Jiang
(2)
Fei Tong
(3)
Guang Cheng
(20)
Hangyu Zhao
(2)
Hao Chen
(1)
Hao Luo
(1)
Heng Li
(1)
Hongyu Wang
(1)
Hua Wu
(7)
Jian Ge
(1)
Jie Cao
(1)
Jinfeng Chen
(2)
Li Deng
(1)
Miao Li
(1)
Nan Hu
(1)
Rongrong Wang
(1)
Ruidong Li
(2)
Shanqing Jiang
(2)
Shanshan Ni
(1)
Shui Yu
(2)
Songtao Liu
(1)
Suyue Wang
(2)
Weiyi Zou
(1)
Wenjie Gao
(1)
Xiaohui Wang
(1)
Xiaoyan Hu
(6)
Xiaoyu Cheng
(1)
Xueji Yang
(1)
Xuman Zhang
(1)
Xuqiong Bian
(1)
Yali Yuan
(5)
Yichao Wang
(1)
Ying Hu
(1)
Yongning Tang
(1)
Yujia Hu
(1)
Yujian Zhang
(1)
Yuwei Xu
(1)
Yuxing Mao
(1)
Yuyang Zhou
(5)
Yuyu Zhao
(3)
Zhe Zhou
(1)
Zhengxin Xu
(1)
Zhiyi Tian
(1)
Zihan Chen
(2)
Zihao Li
(1)
Zongyao Chen
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to