发表论文
(1) 文印一体机个体及工作状态识别方法研究, 信息安全学报, 2023, 第 4 作者(2) A Dynamic Malicious Document Detection Method Based on Multi-Memory Features, IFIP WG 11.9 2023, 2023, 第 7 作者(3) ATS: A Fully Automatic Troubleshooting System with Efficient Anomaly Detection and Localization, ICCS 2023, 2023, 第 7 作者(4) 网络验证研究综述, 软件学报, 2023, 第 4 作者(5) AdaptParse: Adaptive Contextual Aware Attention Network for Log Parsing via Word Classification, 2023 International Joint Conference on Neural Networks (IJCNN), 2023, 第 6 作者(6) UDA-HOID: Unsupervised Domain Adaptation for Human-Object Interaction Detection, 2023 IEEE 35th International Conference on Tools with Artificial Intelligence (ICTAI), 2023, 第 2 作者(7) FindSpy: A Wireless Camera Detection System Based on Pre-Trained Transformers, ISCC, 2023, 第 5 作者(8) ASGNet: Adaptive Semantic Gate Networks for Log-Based Anomaly Diagnosis, 2023 International Conference on Neural Information Processing (ICONIP), 2023, 第 6 作者(9) Physical Layer Authentication Based on Continuous Channel Polarization Response in Low SNR scenes, 2022 IEEE PIMRC, 2022, 第 4 作者(10) 基于卷积神经网络的计算机个体识别, 信息安全学报, 2022, 第 3 作者(11) An Efficient Interference Calculation Model Based on Large Scale Constellations Probabilistic Analysis, 2022 International Conference on Wireless Algorithms, Systems, and Applications(WASA2022), 2022, 第 2 作者(12) PEPC: A Deep Parallel Convolutional Neural Network Model with Pre-trained Embeddings for DGA Detection, IJCNN, 2022, 第 1 作者(13) Specific Emitter Identification via Spatial Characteristic of Polarization Fingerprint, 2022 IEEE ISCC, 2022, 第 3 作者(14) Detecting USB Storage Device Behaviors by Exploiting Electromagnetic Emanations, ICC 2022, 2022, 第 3 作者(15) DGQAN: Dual Graph Question-Answer Attention Networks for Answer Selection, SIGIR ’22, 2022, 第 6 作者(16) BertHANK: hierarchical attention networks with enhanced knowledge and pre-trained model for answer selection, KNOWLEDGE AND INFORMATION SYSTEMS, 2022, 第 6 作者(17) A Fast Identification Method of Shortwave Radio Stations Based on Sparse Component Analysis, ICT, 2021, 第 2 作者(18) QAAN: Question Answering Attention Network for Community Question Classification, WCNC 2021, 2021, 第 2 作者(19) 恶意文档检测研究综述, 信息安全学报, 2021, 第 5 作者(20) 3SPDF: A Semi-Supervised Method for Malicious PDF Detection, INTERNATIONALCONFERENCEONDIGITALFORENSICS2021, 2021, 第 4 作者(21) UTANSA: Static Approach for Multi-Language Malicious Web Scripts Detection, ISCC, 2021, 第 1 作者(22) A novel adversarial example detection method for malicious PDFs using multiple mutated classifiers, DFRWS APAC, 2021, 第 8 作者(23) AMQAN: Adaptive Multi-Attention Question-Answer Networks for Answer Selection, MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, ECML PKDD 2020, PT III, 2021, 通讯作者(24) A GSO Protected Area Calculation Model based on Controllable NGSO System Parameters, 2021 IEEE Symposium on Computers and Communications(ISCC 2021), 2021, 第 1 作者(25) FakeFilter: A cross-distribution Deepfake detection system with domain adaptation, Journal of Computer Security, 2021, 第 6 作者(26) Method for Detecting and Analyzing the Compromising Emanations of USB Storage Devices, 2022 17th-IEEE International Conference on Mobility, Sensing and Networking (MSN), 2021, 第 3 作者(27) FUNC-ESIM: A Dual Pairwise Attention Network for Cross-version Binary Function Matching, IJCNN, 2021, 第 5 作者(28) Specific Emitter Identification via Variational Mode Decomposition and Histogram of Oriented Gradient, International Conference on Telecommunications(ICT), 2021, 第 3 作者(29) Enhancing the feature profiles of web shells by analyzing the performance of multiple detectors, IFIPINTERNATIONALCONFERENCEONDIGITALFORENSICS, 2021, 第 1 作者(30) An end-to-end text spotter with text relation networks, CYBERSECURITY, 2021, 第 8 作者(31) Adaptive smooth l1 loss: A better way to regress scene texts with extreme aspect ratio, ISCC, 2021, 第 4 作者(32) Landscape-Enhanced Graph Attention Network for Rumor Detection, KSEM, 2021, 第 4 作者(33) Detection of RFID cloning attacks: A spatiotemporal trajectory data stream-based practical approach, COMPUTER NETWORKS, 2021, 第 2 作者(34) NFDD: A Dynamic Malicious Document Detection Method Without Manual Feature Dictionary, WASA, 2021, 第 4 作者(35) Aspect and Opinion Terms Co-extraction Using Position-Aware Attention and Auxiliary Labels, KSEM, 2021, 第 5 作者(36) Causal Intervention for Object Detection, 2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI), 2021, 第 1 作者(37) AWGAN: Unsupervised Spectrum Anomaly Detection with Wasserstein Generative Adversarial Network along with Random Reverse Mapping, 2021 International Conference on Mobile Ad-hoc and Sensor Networks(MSN), 2021, 第 1 作者(38) RF-AMOC: Human-related RFID Tag Movement Identification in Access Management of Carries, ACM TRANSACTIONS ON SENSOR NETWORKS, 2020, 第 2 作者(39) 基于HOG-SVM的跳频信号检测识别算法, Detection and Recognition Algorithm for Frequency Hopping Signals Based on HOG-SVM, 信息安全学报, 2020, 第 5 作者(40) ACD: An Adaptable Approach for RFID Cloning Attack Detection, SENSORS, 2020, 第 1 作者(41) 一种针对基于LSTM的DDoS检测器的对抗攻击算法, ICTAI2020, 2020, 第 1 作者(42) A Spatial-Temporal Features Based Fingerprinting Method for Machine tools in DNC Networks, HPCC/DSS/SmartCity 2020, 2020, 第 1 作者(43) 以自主创新引领网络安全产业发展, 保密工作, 2020, 第 3 作者(44) CES2Vec: A Confidentiality-Oriented Word Embedding for Confidential Information Detection, ISCC, 2020, 第 7 作者(45) SCX-SD: Semi-supervised Method for Contextual Sarcasm Detection, KSEM, 2020, 第 5 作者(46) Adversarial Attack against LSTM-based DDoS Intrusion Detection System, ICTAI 2020, 2020, 第 1 作者(47) Similarity of Binaries Across Optimization Levels and Obfuscation, ESORICS 2020, 2020, 第 8 作者(48) TSCNN: A 3D Convolutional Activity Recognition Network Based on RFID RSSI, 2020INTERNATIONALJOINTCONFERENCEONNEURALNETWORKSIJCNN, 2020, 通讯作者(49) A Robust Representation with Pre-trained Start and End Characters Vectors for Noisy Word Recognition, KSEM, 2020, 第 5 作者(50) Depthwise Separable Convolutional Neural Network for Confidential Information Analysis, KSEM, 2020, 第 4 作者(51) HeterSupervise: Package-level Android Malware Analysis Based on Heterogeneous Graph, HPCC, 2020, 第 4 作者(52) Sparse Representation for Device-Free Human Detection and Localization with COTS RFID, ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING (ICA3PP 2019), PT I, 2020, 第 1 作者(53) 基于信息增益的无线通信信号指纹构建及识别机制研究, Fingerprint construction and identity recognition of Wireless signal based on information gain, 信息安全学报, 2020, 第 1 作者(54) A Temporal and Spatial Data Redundancy Processing Algorithm for RFID Surveillance Data, WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 第 4 作者(55) 信息设备电磁辐射信息泄漏的可检测距离估计方法研究, Study on detectable distance for electromagnetic information leakage of information equipment, 信息安全学报, 2020, 第 3 作者(56) CIDetector: Semi-Supervised Method for Multi-Topic Confidential Information Detection, ECAI, 2020, 第 5 作者(57) Malicious documents detection for business process management based on multi-layer abstract model, FUTURE GENERATION COMPUTER SYSTEMS, 2019, 第 7 作者(58) Determination of an Indoor Target Position: An Accurate and Adaptable Approach Based on Differential Positioning, INTERNATIONAL JOURNAL OF ANTENNAS AND PROPAGATION, 2019, 第 3 作者(59) Research on Physical Layer Security Scheme Based on OAM Modulation for Wireless Communications, WASA 2019, 2019, 第 1 作者(60) Attend in Bands: Hyperspectral Band Weighting and Selection for Image Classification, IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING, 2019, 第 3 作者(61) 基于稀疏学习的RFID被动式目标检测与定位, 19th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP), 2019, 第 1 作者(62) Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation, MILCOM, 2019, 第 7 作者(63) 基于SeqGAN的模拟攻击方法, Inscrypt2019, 2019, 第 1 作者(64) Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection, MILCOM, 2019, 第 7 作者(65) HDMI接口视频信息泄漏还原重建的影响因素研究, 保密科学技术, 2019, 第 5 作者(66) A Dual-polarized Antennas Based Directional Modulation Scheme, 2019 26TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2019, 第 5 作者(67) 基于复合多尺度色散熵的特定辐射源识别, International Journal of Information and Communication Engineering, 2019, 第 1 作者(68) 基于布隆过滤器的RFID数据冗余处理算法研究 中文名称, 信 息 安 全 学 报, 2019, 第 1 作者(69) Adversarial Attack against DoS Intrusion Detection: An Improved Boundary-Based Method, 2019 IEEE 31ST INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2019), 2019, 第 2 作者(70) 基于物理层安全的安全高效星座设计方法, 第三届智能物联网会议, 2019, 第 1 作者(71) MixDroid: A Multi-features and Multi-classifiers Bagging System for Android Malware Detection, 6TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION (CDMMS 2018), 2018, 通讯作者(72) 基于混沌理论的彩色QR编码水印技术研究, Research on color QR code watermarking technology based on chaos theory, 通信学报, 2018, 第 2 作者(73) Environmentally Adaptive Real-time Detection of RFID False Readings in a New Practical Scenario, 2018IEEESMARTWORLDUBIQUITOUSINTELLIGENCECOMPUTINGADVANCEDTRUSTEDCOMPUTINGSCALABLECOMPUTINGCOMMUNICATIONSCLOUDBIGDATACOMPUTINGINTERNETOFPEOPLEANDSMARTCITYINNOVATIONSMARTWORLDSCALCOMUICATCCBDCOMIOPSCI, 2018, 第 6 作者(74) 日本车联网信息安全发展现状与分析, 中国信息安全, 2017, 第 3 作者(75) Recognition of Information Leakage of Computer via Conducted Emanations on the Power Line, 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, 第 4 作者(76) 基于恶意读写器发现的RFID空口入侵检测技术研究, 软件学报, 2017, 第 1 作者(77) Design and Realization of an Indoor Positioning Algorithm Based on Differential Positioning Method, WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017, 2017, 第 1 作者(78) 基于电源线传导的计算机信息电磁泄漏识别, 第三届国际大数据云信息安全会议, 2017, 第 1 作者(79) 基于多图像盲解卷积的电磁信息泄漏识别, 无线算法、系统及应用, 2017, 第 1 作者(80) 一种基于差分定位原理的室内定位算法设计与实现, The 12th International Conference on Wireless Algorithms, Systems, and Applications, 2017, 第 1 作者(81) 适用于云取证的证据数据完整性评估方法, Evaluation method of evidence data integrity adaptive for cloud forensics, 华中科技大学学报:自然科学版, 2016, 第 3 作者(82) KVM虚拟化动态迁移技术的安全防护模型研究, 软件学报, 2016, 第 1 作者(83) 物理空间信息安全技术发展综述, Summary of Physical Space Information Security Technology Development, 信息安全研究, 2016, 第 2 作者(84) Method for detecting text information leakage in electromagnetic radiation from a computer display, IET INFORMATION SECURITY, 2016, 第 5 作者(85) KVM虚拟化动态迁移技术的安全防护模型, Security Protection Model on Live Migration for KVM Virtualization, 软件学报, 2016, 第 6 作者(86) Efficient and anti-interference method of synchronising information extraction for cideo leaking signal, IET SIGNAL PROCESSING, 2016, 第 5 作者(87) Method for Detecting Information Leakage From Computer Display in Electromagnetic Radiation, 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, 第 5 作者(88) 多媒体技术在物理空间安全领域的应用与发展, Development and Applications of Multimedia Technology in Physical Space Security, 信息安全研究, 2016, 第 5 作者(89) 光纤通信的光信息获取及防护技术研究, Eavesdropping Attacks on Optical Fiber Communication and Countermeasure of Optical Fiber Sensing Technology, 信息安全研究, 2016, 第 5 作者(90) A New Method to Recognize Computer through Electromagnetic Radiation Based on Spectral Centroid, 2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2016, 第 5 作者(91) 基于电源线的电磁信息泄漏建模与实验分析, Modeling and experimental research on electromagnetic information leakage from power lines, 中国科学. 信息科学, 2015, 第 2 作者(92) An efficient clustering mining algorithm for indoor moving target trajectory based on the improved AGNES, 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, 通讯作者(93) 日本车联网信息安全发展现状及对策, 中国信息安全, 2015, 第 3 作者(94) 基于极化状态— 幅度— 相位调制的高效无线传输方案, An efficient polarization-amplitude-phase modulation scheme for wireless communication, 中国科学. 信息科学, 2015, 第 5 作者(95) A Comprehensive Method to Combine RFID Indoor Targets Positioning with Real Geographic Environment, COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2015, 通讯作者(96) 基于汉明重量模型的密码设备放大模板攻击, Amplified Template Attacks on Cryptographic Devices Using Hamming Weight Model, 密码学报, 2015, 第 3 作者(97) A Spectrum Efficient Polarized OFDM Scheme for Wireless Depolarized Channel, 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2015, 第 4 作者(98) An Efficient Visualization Method of RFID Indoor Positioning Data, 2014 2ND INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2014, 通讯作者(99) 信息安全标准化战略对国家核心利益的重要作用研究——从中关两国的比较视角, Study on the Information Security Standardization Strategy and Key Impact on the Core National Interest—— Comparison of US and China, 北京电子科技学院学报, 2013, 第 1 作者(100) 云计算应用于涉密网的可行性研究, 保密科学技术, 2012, 第 2 作者(101) 基于云计算的服务器虚拟化技术探析, 保密科学技术, 2012, 第 3 作者(102) 独立的涉密网间跨域密钥分发技术研究, Studies On Key Distribution Between Isolated Classified-Networks", 信息安全与通信保密, 2008, 第 3 作者