Adaptive segmented webpage text based malicious website detection G Sun, Z Zhang, Y Cheng, T Chai Computer Networks 216, 109236, 2022 | 10 | 2022 |
Performance analysis of root anycast nodes based on active measurement C Li, Y Cheng, H Men, Z Zhang, N Li Electronics 11 (8), 1194, 2022 | 10 | 2022 |
Detecting malicious domain names with abnormal whois records using feature-based rules Y Cheng, T Chai, Z Zhang, K Lu, Y Du The Computer Journal 65 (9), 2262-2275, 2022 | 9 | 2022 |
Text classification with improved word embedding and adaptive segmentation G Sun, Y Cheng, Z Zhang, X Tong, T Chai Expert Systems with Applications 238, 121852, 2024 | 5 | 2024 |
Illegal Domain Name Generation Algorithm Based on Character Similarity of Domain Name Structure Y Liang, Y Cheng, Z Zhang, T Chai, C Li Applied Sciences 13 (6), 4061, 2023 | 3 | 2023 |
In-Depth Evaluation of the Impact of National-Level DNS Filtering on DNS Resolvers over Space and Time Y Cheng, Y Liu, C Li, Z Zhang, N Li, Y Du Electronics 11 (8), 1276, 2022 | 3 | 2022 |
Birds of a feather flock together: Generating pornographic and gambling domain names based on character composition similarity Y Cheng, H Jiang, Z Zhang, Y Du, T Chai Wireless Communications and Mobile Computing 2022 (1), 4408987, 2022 | 3 | 2022 |
Configuration anormaly detection and resolution risk assessment of authoritative domain name server C Li, Y Cheng, Z Zhang, P Yu Computers & Security 135, 103426, 2023 | 2 | 2023 |
Root Mirror Sites Identification and Service Area Analysis J Wang, Z Li, Z Zhang, J Chen, C Li, Y Cheng Electronics 12 (7), 1737, 2023 | 2 | 2023 |
Multi-Label Text Classification model integrating Label Attention and Historical Attention G Sun, Y Cheng, F Dong, L Wang, D Zhao, Z Zhang, X Tong Knowledge-Based Systems 296, 111878, 2024 | 1 | 2024 |
Efficient and Privacy-Enhanced Federated Learning Based on Parameter Degradation W Li, P Yu, Y Cheng, J Yan, Z Zhang IEEE Transactions on Services Computing, 2024 | 1 | 2024 |
Research on the Construction of High-Trust Root Zone File Based on Multi-Source Data Verification C Li, J Xie, Y Cheng, Z Zhang, J Chen, H Wang, H Tao Electronics 12 (10), 2264, 2023 | 1 | 2023 |
Evaluating the effectiveness of handling abusive domain names by internet entities Y Cheng, Y Liu, L Wang, Z Zhang, T Chai, Y Du Electronics 11 (8), 1172, 2022 | 1 | 2022 |
Disclosing features and characteristics of .com registrars' whois servers Y Cheng Communication Engineering, Network Technology and Data Mining, 2022 | 1 | 2022 |
Characterizing the Security Threats of Disposable Phone Numbers Y Cheng, H Wang, Z Zhang, N Li International Conference on Frontiers in Cyber Security, 491-507, 2020 | 1 | 2020 |
LMTCSG: Multilabel Text Classification Combining Sequence-Based and GNN-Based Features G Sun, J Li, Y Cheng, Z Zhang IEEE Transactions on Industrial Informatics, 2024 | | 2024 |
Censorship data-driven DNS resolution anomaly detection: An ensemble algorithm model with multivariate feature fusion C Li, Y Cheng, Z Zhang, ZD Zhang Computer Networks 252, 110669, 2024 | | 2024 |
Data mining of encrypted network traffic for adult content and gambling Android applications L Wang, Z Ning, Y Cheng, Y Li, Z Zhang Third International Conference on Electronic Information Engineering, Big …, 2024 | | 2024 |
Revealing security vulnerabilities of chinese local government websites through topology analysis and knowledge graph J Xie, M Zuo, Y Cheng, Z Zhang Third International Conference on Electronic Information Engineering, Big …, 2024 | | 2024 |
DNS root server resolution anomaly detection C Li, J Chen, Z Zhang, Z Li, Y Cheng, C Ma Computers & Security, 103946, 2024 | | 2024 |