default search action
Yipeng Wang 0001
Person information
- affiliation: Beijing University of Technology, Faculty of Information Technology, China
- affiliation (former): Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
- affiliation (PhD 2014): Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China
Other persons with the same name
- Yipeng Wang 0002 — Intel Labs, Portland, OR, USA
- Yipeng Wang 0003 — Xilinx, Singapore (and 1 more)
- Yipeng Wang 0004 — Beijing Jiaotong University, Beijing, China
- Yipeng Wang 0005 — School of Automation, Beijing Institute of Technology, Beijing, China
- Yipeng Wang 0006 — AltheaDx Inc., San Diego, CA, USA
- Yipeng Wang 0007 — Beijing University of Posts and Telecommunications, Beijing, China
- Yipeng Wang 0008 — University of Waterloo, Canada
- Yipeng Wang 0009 — Pi2star Technology, Beijing, China
- Yipeng Wang 0010 — National University of Defense Technology, Changsha, China
- Yipeng Wang 0011 — Nanjing Normal University, Key Laboratory of Virtual Geographic Environment, China
- Yipeng Wang 0012 — Xi'an Jiaotong University, School of Information and Communications Engineering, China
- Yipeng Wang 0013 — Alibaba Group, Hangzhou, China (and 1 more)
- Yipeng Wang 0014 — Lanzhou University, College of Earth and Environmental Sciences, China
- Yipeng Wang 0015 — Beijing University of Technology, Faculty of Materials and Manufacturing, Institute of Light Alloy and Processing, China
- Yipeng Wang 0016 — Sorbonne University, CNRS, Paris, France
- Yipeng Wang 0017 — University of Texas, Austin, TX, USA
- Yipeng Wang 0018 — Meta
- Yipeng Wang 0019 — Jilin Animation Institute, Changchun, China
- Yipeng Wang 0020 — University of California Riverside, CA, USA
- Yipeng Wang 0021 — PLA Unit, Cangzhou, China
- Yipeng Wang 0022 — Guangzhou University, Institute of Artificial Intelligence and Blockchain, China
- Yipeng Wang 0023 — University of Electronic Science and Technology of China, School of Information and Communication Engineering, Chengdu, China
- Yipeng Wang 0024 — WHO Family of International Classifications in China, Beijing, China (and 1 more)
- Yipeng Wang 0025 — Jimei University, Marine Traffic Safety Institute, College of Navigation, Xiamen, China
- Yipeng Wang 0026 — Wuhan University of Technology, School of Transportation and Logistics Engineering, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Siqi Le, Yingxu Lai, Yipeng Wang, Huijie He:
An adaptive classification and updating method for unknown network traffic in open environments. Comput. Networks 238: 110114 (2024) - [j23]Yanzhuo Jiang, Xueman Wang, Yingxu Lai, Yipeng Wang:
A Packet Sequence Permutation-Aware Approach to Robust Network Traffic Classification. IEEE Netw. Lett. 6(3): 203-207 (2024) - [j22]Yige Chen, Yipeng Wang:
MPAF: Encrypted Traffic Classification With Multi-Phase Attribute Fingerprint. IEEE Trans. Inf. Forensics Secur. 19: 7091-7105 (2024) - [c38]Zhenxin Guo, Yiming Liu, Yipeng Wang, Yue Meng, Baoling Liu:
Joint Communication-Motion Planning for UAV Swarm against Jamming with Multi-Agent Deep Reinforcement Learning. PIMRC 2024: 1-7 - 2023
- [j21]Tong Tang, Yingxu Lai, Yipeng Wang:
Relational reasoning-based approach for network protocol reverse engineering. Comput. Networks 230: 109797 (2023) - [j20]Huijie He, Yingxu Lai, Yipeng Wang, Siqi Le, Zijian Zhao:
A data skew-based unknown traffic classification approach for TLS applications. Future Gener. Comput. Syst. 138: 1-12 (2023) - [j19]Bitao Tian, Yingxu Lai, Samuel S. M. Sun, Yipeng Wang, Jing Liu:
MSGAN: multi-stage generative adversarial network-based data recovery in cyber-attacks. Neural Comput. Appl. 35(28): 20675-20695 (2023) - [j18]Xiaotian Ma, Yipeng Wang, Yingxu Lai, Wenxu Jia, Zijian Zhao, Huijie He, Ruiping Yin, Yige Chen:
A Multi-Perspective Feature Approach to Few-Shot Classification of IoT Traffic. IEEE Trans. Green Commun. Netw. 7(4): 2052-2066 (2023) - [j17]Motong Sun, Yingxu Lai, Yipeng Wang, Jing Liu, Beifeng Mao, Haoran Gu:
Intrusion Detection System Based on In-Depth Understandings of Industrial Control Logic. IEEE Trans. Ind. Informatics 19(3): 2295-2306 (2023) - [j16]Xiaochun Yun, Yipeng Wang, Yongzheng Zhang, Chen Zhao, Zijian Zhao:
Encrypted TLS Traffic Classification on Cloud Platforms. IEEE/ACM Trans. Netw. 31(1): 164-177 (2023) - [j15]Yipeng Wang, Huijie He, Yingxu Lai, Alex X. Liu:
A Two-Phase Approach to Fast and Accurate Classification of Encrypted Traffic. IEEE/ACM Trans. Netw. 31(3): 1071-1086 (2023) - [c37]Yipeng Wang, Yiming Liu, Jiaxiang Zhang, Baoling Liu:
Joint Trajectory Optimization and Task Offloading for UAV-Assisted Mobile Edge Computing. PIMRC 2023: 1-6 - [i1]Mingzhu Zhang, Ruiping Yin, Zhen Yang, Yipeng Wang, Kan Li:
Advances and Challenges of Multi-task Learning Method in Recommender System: A Survey. CoRR abs/2305.13843 (2023) - 2022
- [j14]Yingxu Lai, Liyao Tong, Jing Liu, Yipeng Wang, Tong Tang, Zijian Zhao, Hua Qin:
Identifying malicious nodes in wireless sensor networks based on correlation detection. Comput. Secur. 113: 102540 (2022) - [j13]Zijian Zhao, Yingxu Lai, Yipeng Wang, Wenxu Jia, Huijie He:
A Few-Shot Learning Based Approach to IoT Traffic Classification. IEEE Commun. Lett. 26(3): 537-541 (2022) - [j12]Haoran Gu, Yingxu Lai, Yipeng Wang, Jing Liu, Motong Sun, Beifeng Mao:
DEIDS: a novel intrusion detection system for industrial control systems. Neural Comput. Appl. 34(12): 9793-9811 (2022) - [j11]Haoran Gu, Yingxu Lai, Yipeng Wang, Jing Liu, Motong Sun, Beifeng Mao:
Correction to: DEIDS: a novel intrusion detection system for industrial control systems. Neural Comput. Appl. 34(23): 21405 (2022) - [j10]Yipeng Wang, Xiaochun Yun, Yongzheng Zhang, Chen Zhao, Xin Liu:
A Multi-Scale Feature Attention Approach to Network Traffic Classification and Its Model Explanation. IEEE Trans. Netw. Serv. Manag. 19(2): 875-889 (2022) - [c36]Yizhe Gu, Yingxu Lai, Yipeng Wang:
Zen-tor: A Zero Knowledge Known-Unknown Traffic Classification Method. GLOBECOM 2022: 885-890 - [c35]Wenxu Jia, Yipeng Wang, Yingxu Lai, Huijie He, Ruiping Yin:
FITIC: A Few-shot Learning Based IoT Traffic Classification Method. ICCCN 2022: 1-10 - [c34]Shuhe Liu, Xiaolin Xu, Yongzheng Zhang, Yipeng Wang:
Autonomous Anti - interference Identification of $\text{IoT}$ Device Traffic based on Convolutional Neural Network. IJCNN 2022: 1-8 - 2021
- [j9]Yuwei Zeng, Xiaochun Yun, Xunxun Chen, Boquan Li, Haiwei Tsang, Yipeng Wang, Tianning Zang, Yongzheng Zhang:
Finding disposable domain names: A linguistics-based stacking approach. Comput. Networks 184: 107642 (2021) - [c33]Yige Chen, Tianning Zang, Yongzheng Zhang, Yuan Zhou, Peng Yang, Yipeng Wang:
Inspector: A Semantics-Driven Approach to Automatic Protocol Reverse Engineering. CollaborateCom (1) 2021: 348-367 - 2020
- [j8]Xiaochun Yun, Ji Huang, Yipeng Wang, Tianning Zang, Yuan Zhou, Yongzheng Zhang:
Khaos: An Adversarial Neural Network DGA With High Anti-Detection Ability. IEEE Trans. Inf. Forensics Secur. 15: 2225-2240 (2020) - [c32]Hui Liu, Yongzheng Zhang, Yipeng Wang, Zheng Lin, Yige Chen:
Joint Character-Level Word Embedding and Adversarial Stability Training to Defend Adversarial Text. AAAI 2020: 8384-8391 - [c31]Chen Zhao, Yongzheng Zhang, Tianning Zang, Yige Chen, Yipeng Wang:
A Multi-feature-based Approach to Malicious Domain Name Identification from DNS Traffic. ICT 2020: 1-5 - [c30]Linshu Ouyang, Yongzheng Zhang, Hui Liu, Yige Chen, Yipeng Wang:
Gated POS-Level Language Model for Authorship Verification. IJCAI 2020: 4025-4031 - [c29]Linshu Ouyang, Yongzheng Zhang, Yipeng Wang:
Unified Graph Embedding-Based Anomalous Edge Detection. IJCNN 2020: 1-8 - [c28]Chen Zhao, Yongzheng Zhang, Yipeng Wang:
A Feature Ensemble-based Approach to Malicious Domain Name Identification from Valid DNS Responses. IJCNN 2020: 1-7
2010 – 2019
- 2019
- [c27]Xiangpeng Wei, Yue Hu, Luxi Xing, Yipeng Wang, Li Gao:
Translating with Bilingual Topic Knowledge for Neural Machine Translation. AAAI 2019: 7257-7264 - [c26]Dingkui Yan, Huilin Zhang, Yipeng Wang, Tianning Zang, Xiaolin Xu, Yuwei Zeng:
Pontus: A Linguistics-Based DGA Detection System. GLOBECOM 2019: 1-6 - [c25]Yuwei Zeng, Tianning Zang, Yongzheng Zhang, Xunxun Chen, Yipeng Wang:
A Comprehensive Measurement Study of Domain-Squatting Abuse. ICC 2019: 1-6 - [c24]Yige Chen, Tianning Zang, Yongzheng Zhang, Yuan Zhou, Yipeng Wang:
Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach. ICNP 2019: 1-11 - [c23]Yuwei Zeng, Yongzheng Zhang, Tianning Zang, Xunxun Chen, Yipeng Wang:
A Linguistics-based Stacking Approach to Disposable Domains Detection. ICNP 2019: 1-4 - [c22]Zhicheng Liu, Xiaochun Yun, Yongzheng Zhang, Yipeng Wang:
CCGA: Clustering and Capturing Group Activities for DGA-Based Botnets Detection. TrustCom/BigDataSE 2019: 136-143 - 2018
- [j7]Miao Yu, Yongzheng Zhang, Tianning Zang, Yipeng Wang, Yijing Wang:
Information Propagation Prediction Based on Key Users Authentication in Microblogging. Secur. Commun. Networks 2018: 7024842:1-7024842:7 (2018) - [c21]Chen Zhao, Yongzheng Zhang, Tianning Zang, Zhizhou Liang, Yipeng Wang:
A Stacking Approach to Objectionable-Related Domain Names Identification by Passive DNS Traffic (Short Paper). CollaborateCom 2018: 284-294 - [c20]Ji Huang, Pei Wang, Tianning Zang, Qian Qiang, Yipeng Wang, Miao Yu:
Detecting Domain Generation Algorithms with Convolutional Neural Language Models. TrustCom/BigDataSE 2018: 1360-1367 - [c19]Yang Liu, Shuzhuang Zhang, Bo Ding, Xiaoqing Li, Yipeng Wang:
A cascade forest approach to application classification of mobile traces. WCNC 2018: 1-6 - 2017
- [j6]Yipeng Wang, Xiaochun Yun, Yongzheng Zhang, Liwei Chen, Tianning Zang:
Rethinking robust and accurate application protocol identification. Comput. Networks 129: 64-78 (2017) - [j5]Yipeng Wang, Xiaochun Yun, Yongzheng Zhang, Liwei Chen, Guangjun Wu:
A nonparametric approach to the automated protocol fingerprint inference. J. Netw. Comput. Appl. 99: 1-9 (2017) - [c18]Guangjun Wu, Xiao-chun Yun, Chao Li, Shupeng Wang, Yipeng Wang, Xiaoyu Zhang, Siyu Jia, Guangyan Zhang:
Supporting Real-Time Analytic Queries in Big and Fast Data Environments. DASFAA (2) 2017: 477-493 - 2016
- [j4]Liwei Chen, Yipeng Wang, Huandong Wang, Wenxiang Wang, Hua Jing, Guangfei Zhang:
Multiple-combinational-channel: A network architecture for workload balance and deadlock free. Future Gener. Comput. Syst. 56: 238-246 (2016) - [j3]Xiao-chun Yun, Yipeng Wang, Yongzheng Zhang, Yu Zhou:
A Semantics-Aware Approach to the Automated Network Protocol Identification. IEEE/ACM Trans. Netw. 24(1): 583-595 (2016) - 2015
- [j2]Yu Zhou, Xiaokang Yang, Yongzheng Zhang, Xiang Xu, Yipeng Wang, Xiujuan Chai, Weiyao Lin:
Unsupervised adaptive sign language recognition based on hypothesis comparison guided cross validation and linguistic prior filtering. Neurocomputing 149: 1604-1612 (2015) - [j1]Xiaoyu Zhang, Shupeng Wang, Xiaobin Zhu, Xiao-chun Yun, Guangjun Wu, Yipeng Wang:
Update vs. upgrade: Modeling with indeterminate multi-class active learning. Neurocomputing 162: 163-170 (2015) - [c17]Yipeng Wang, Xiao-chun Yun, Yongzheng Zhang:
Rethinking Robust and Accurate Application Protocol Identification: A Nonparametric Approach. ICNP 2015: 134-144 - [c16]Yongzheng Zhang, Tao Xu, Yipeng Wang, Jianliang Sun, Xiaoyu Zhang:
A Markov Random Field Approach to Automated Protocol Signature Inference. SecureComm 2015: 459-476 - 2014
- [c15]Yu Zhou, Shuang Liu, Yongzheng Zhang, Yipeng Wang, Weiyao Lin:
Perspective Scene Text Recognition with Feature Compression and Ranking. ACCV Workshops (2) 2014: 181-195 - [c14]Yu Zhou, Shuang Liu, Yongzheng Zhang, Yipeng Wang, Weiyao Lin:
Text localization in natural scene images with stroke width histogram and superpixel. APSIPA 2014: 1-4 - [c13]Shuang Liu, Yu Zhou, Yongzheng Zhang, Yipeng Wang, Weiyao Lin:
Text Detection in Natural Scene Images with Stroke Width Clustering and Superpixel. PCM 2014: 123-132 - [c12]Yafei Sang, Yongzheng Zhang, Yipeng Wang, Yu Zhou, Xu Tao:
A Segmentation Pattern Based Approach to Automated Protocol Identification. PDCAT 2014: 7-12 - [c11]Yu Zhou, Yongzheng Zhang, Jun Xiao, Yipeng Wang, Weiyao Lin:
Visual Similarity Based Anti-phishing with the Combination of Local and Global Features. TrustCom 2014: 189-196 - 2012
- [c10]Yipeng Wang, Xiao-chun Yun, Muhammad Zubair Shafiq, Liyan Wang, Alex X. Liu, Zhibin Zhang, Danfeng Yao, Yongzheng Zhang, Li Guo:
A semantics aware approach to automated reverse engineering unknown protocols. ICNP 2012: 1-10 - [c9]Shicong Li, Xiao-chun Yun, Yongzheng Zhang, Jun Xiao, Yipeng Wang:
A General Framework of Trojan Communication Detection Based on Network Traces. NAS 2012: 49-58 - [c8]Shuhao Li, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang, Xiang Cui, Yipeng Wang:
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks. SEC 2012: 261-272 - 2011
- [c7]Yipeng Wang, Zhibin Zhang, Danfeng (Daphne) Yao, Buyun Qu, Li Guo:
Inferring Protocol State Machine from Network Traces: A Probabilistic Approach. ACNS 2011: 1-18 - [c6]Yong Zhao, Zhibin Zhang, Yipeng Wang, Li Guo, Binxing Fang:
Performance evaluation of Xunlei peer-to-peer network: A measurement study. CCNC 2011: 257-261 - [c5]Yipeng Wang, Zhibin Zhang, Li Guo, Shuhao Li:
Using Entropy to Classify Traffic More Deeply. NAS 2011: 45-52 - [c4]Yipeng Wang, Xingjian Li, Jiao Meng, Yong Zhao, Zhibin Zhang, Li Guo:
Biprominer: Automatic Mining of Binary Protocol Features. PDCAT 2011: 179-184 - [c3]Shuhao Li, Xiao-chun Yun, Zhiyu Hao, Xiang Cui, Yipeng Wang:
A Propagation Model for Social Engineering Botnets in Social Networks. PDCAT 2011: 423-426 - [c2]Yipeng Wang, Zhibin Zhang, Li Guo:
Traffic classification beyond application level: identifying content types from network traces. SAC 2011: 540-541 - 2010
- [c1]Yipeng Wang, Zhibin Zhang, Li Guo:
Inferring Protocol State Machine from Real-World Trace. RAID 2010: 498-499
Coauthor Index
aka: Xiaochun Yun
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-30 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint