
Shuhao Li
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j8]Jiang Xie
, Shuhao Li, Xiaochun Yun, Yongzheng Zhang, Peng Chang:
HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics. Comput. Secur. 96: 101923 (2020) - [c37]Haiwen Wang, Ruijie Wang, Chuan Wen, Shuhao Li, Yuting Jia, Weinan Zhang, Xinbing Wang:
Author Name Disambiguation on Heterogeneous Information Network with Adversarial Representation Learning. AAAI 2020: 238-245 - [c36]Jinhao Zhang, Shuhao Li, Yijie Ding, Jijun Tang, Fei Guo:
An two-layer predictive model of ensemble classifier chain for detecting antimicrobial peptides. BIBM 2020: 56-61 - [c35]Xiaolin Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Jia Li:
Challenge Collapsar (CC) Attack Traffic Detection Based on Packet Field Differentiated Preprocessing and Deep Neural Network. ICCS (3) 2020: 282-296 - [c34]Zhicheng Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Chengwei Peng:
Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network. ICCS (3) 2020: 379-398 - [c33]Zhicheng Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Zhenyu Cheng:
Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks. ISCC 2020: 1-7 - [c32]Zhiqiang Wang, Shuhao Li, Bingyan Wang, Xiaorui Ren, Tao Yang:
A Malicious URL Detection Model Based on Convolutional Neural Network. SocialSec 2020: 34-40 - [i1]Haiwen Wang, Ruijie Wang, Chuan Wen, Shuhao Li, Yuting Jia, Weinan Zhang, Xinbing Wang:
Author Name Disambiguation on Heterogeneous Information Network with Adversarial Representation Learning. CoRR abs/2002.09803 (2020)
2010 – 2019
- 2019
- [j7]Jiapeng Zhang
, Luoyi Fu
, Shuhao Li, Yuhang Yao
, Xinbing Wang
:
Core Percolation in Interdependent Networks. IEEE Trans. Netw. Sci. Eng. 6(4): 952-967 (2019) - [c31]Mao Tian, Peng Chang, Yafei Sang, Yongzheng Zhang, Shuhao Li:
Mobile Application Identification Over HTTPS Traffic Based on Multi-view Features. ICT 2019: 73-79 - [c30]Jiang Xie, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Jia Li:
A Method Based on Hierarchical Spatiotemporal Features for Trojan Traffic Detection. IPCCC 2019: 1-8 - [c29]Zhenyu Cheng
, Xunxun Chen
, Yongzheng Zhang, Shuhao Li, Jian Xu:
MURITE-Detector: Identifying User-Role in Information Theft Events of Mobile Network. TrustCom/BigDataSE 2019: 232-239 - [c28]Jia Li, Xiaochun Yun, Mao Tian, Jiang Xie, Shuhao Li, Yongzheng Zhang, Yu Zhou:
A Method of HTTP Malicious Traffic Detection on Mobile Networks. WCNC 2019: 1-8 - 2018
- [c27]Zhenyu Cheng
, Xunxun Chen
, Yongzheng Zhang, Shuhao Li, Jian Xu:
MUI-defender: CNN-Driven, Network Flow-Based Information Theft Detection for Mobile Users. CollaborateCom 2018: 329-345 - [c26]Chengwei Peng, Xiaochun Yun, Yongzheng Zhang, Shuhao Li:
MalShoot: Shooting Malicious Domains Through Graph Embedding on Passive DNS Data. CollaborateCom 2018: 488-503 - [c25]Yaping Chi, Zhiting Ling, Xuejing Ba, Shuhao Li:
An Analysis of a New Detection Method for Spear Phishing Attack. CSPS (3) 2018: 1063-1072 - [c24]Chengwei Peng, Xiaochun Yun, Yongzheng Zhang, Shuhao Li:
MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query. ICICS 2018: 685-695 - 2017
- [c23]Qiquan Wang, Xiaoyan Li, Shuhao Li, Songli Yang:
Risks and risk control of wind power enterprises. ICNC-FSKD 2017: 3070-3075 - [c22]Zhenyu Cheng
, Xunxun Chen
, Yongzheng Zhang, Shuhao Li, Yafei Sang:
Detecting Information Theft Based on Mobile Network Flows for Android Users. NAS 2017: 1-10 - [c21]Chengwei Peng, Xiaochun Yun, Yongzheng Zhang, Shuhao Li, Jun Xiao:
Discovering Malicious Domains through Alias-Canonical Graph. TrustCom/BigDataSE/ICESS 2017: 225-232 - [c20]Jingkun Liu, Shuhao Li, Yongzheng Zhang, Jun Xiao, Peng Chang, Chengwei Peng:
Detecting DNS Tunnel through Binary-Classification Based on Behavior Features. TrustCom/BigDataSE/ICESS 2017: 339-346 - 2015
- [j6]Xiang Cui, Lihua Yin, Shuyuan Jin, Zhiyu Hao, Shuhao Li:
Botnet spoofing: fighting botnet with itself. Secur. Commun. Networks 8(1): 80-89 (2015) - [j5]Xiao-chun Yun, Shuhao Li
, Yongzheng Zhang:
SMS Worm Propagation Over Contact Social Networks: Modeling and Validation. IEEE Trans. Inf. Forensics Secur. 10(11): 2365-2380 (2015) - 2014
- [c19]Tao Yin, Yongzheng Zhang, Shuhao Li:
DR-SNBot: A Social Network-Based Botnet with Strong Destroy-Resistance. NAS 2014: 191-199 - 2012
- [c18]Shuhao Li, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang, Xiang Cui, Yipeng Wang:
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks. SEC 2012: 261-272 - 2011
- [j4]Lidong Zhai, Li Guo, Xiang Cui, Shuhao Li:
Research on Real-time Publish/Subscribe System supported by Data-Integration. J. Softw. 6(6): 1133-1139 (2011) - [c17]Peng Liao, Xiang Cui, Shuhao Li, Chaoge Liu:
Poster: recoverable botnets: a hybrid C&C approach. CCS 2011: 833-836 - [c16]Yipeng Wang, Zhibin Zhang, Li Guo, Shuhao Li:
Using Entropy to Classify Traffic More Deeply. NAS 2011: 45-52 - [c15]Shuhao Li, Xiao-chun Yun, Zhiyu Hao, Xiang Cui, Yipeng Wang:
A Propagation Model for Social Engineering Botnets in Social Networks. PDCAT 2011: 423-426 - 2010
- [j3]Shuhao Li, Sandie Balaguer, Alexandre David, Kim G. Larsen, Brian Nielsen, Saulius Pusinskas:
Scenario-based verification of real-time systems using Uppaal. Formal Methods Syst. Des. 37(2-3): 200-264 (2010) - [c14]Kim Guldstrand Larsen, Shuhao Li, Brian Nielsen, Saulius Pusinskas:
Scenario-based analysis and synthesis of real-time systems using uppaal. DATE 2010: 447-452 - [c13]Ming Zhu, Liyi Xiao, Shuhao Li, Yanjing Zhang:
Efficient Two-Dimensional Error Codes for Multiple Bit Upsets Mitigation in Memory. DFT 2010: 129-135 - [c12]Shuhao Li, Paul Pettersson
:
Verification and controller synthesis for resource-constrained real-time systems: Case study of an autonomous truck. ETFA 2010: 1-8 - [c11]Alexandre David, Kim Guldstrand Larsen, Shuhao Li, Marius Mikucionis, Brian Nielsen:
Testing Real-Time Systems under Uncertainty. FMCO 2010: 352-371
2000 – 2009
- 2009
- [j2]Mengluo Ji, Ji Wang, Shuhao Li, Zhi-Chang Qi:
Automated Worst-Case Execution Time Analysis Based on Program Modes. Comput. J. 52(5): 530-544 (2009) - [c10]Kim Guldstrand Larsen, Shuhao Li, Brian Nielsen, Saulius Pusinskas:
Verifying Real-Time Systems against Scenario-Based Requirements. FM 2009: 676-691 - [c9]Alexandre David, Kim Guldstrand Larsen, Shuhao Li, Brian Nielsen:
Timed Testing under Partial Observability. ICST 2009: 61-70 - 2008
- [j1]Alexandre David, Kim Guldstrand Larsen, Shuhao Li, Brian Nielsen:
Cooperative Testing of Timed Systems. Electron. Notes Theor. Comput. Sci. 220(1): 79-92 (2008) - [c8]Alexandre David, Kim Guldstrand Larsen, Shuhao Li, Brian Nielsen:
A Game-Theoretic Approach to Real-Time System Testing. DATE 2008: 486-491 - [c7]Wei-ling Chang, Xiao-chun Yun, Binxing Fang, Shupeng Wang, Shuhao Li:
A Quasi Word-Based Compression Method of English Text Using Byte-Oriented Coding Scheme. WAIM 2008: 558-563 - 2006
- [c6]Mengluo Ji, Ji Wang, Shuhao Li, Zhi-Chang Qi:
Automated WCET Analysis Based on Program Modes. AST 2006: 36-42 - 2005
- [c5]Shuhao Li, Ji Wang, Xin Wang, Zhi-Chang Qi:
Configuration-Oriented Symbolic Test Sequence Construction Method for EFSM. COMPSAC (1) 2005: 13-18 - [c4]Xin Wang, Zhi-Chang Qi, Shuhao Li:
An Optimized Method for Automatic Test Oracle Generation from Real-Time Specification. ICECCS 2005: 440-449 - 2004
- [c3]Shuhao Li, Ji Wang, Wei Dong, Zhichang Qi:
Property-Oriented Testing of Real-Time Systems. APSEC 2004: 358-365 - [c2]Shuhao Li, Ji Wang, Zhi-Chang Qi:
Property-Oriented Test Generation from UML Statecharts. ASE 2004: 122-131 - [c1]Shuhao Li, Zhi-Chang Qi:
Property-Oriented Testing: An Approach to Focusing Testing Efforts on Behaviours of Interest. SOQUA/TECOS 2004: 191-206
Coauthor Index
aka: Xiaochun Yun

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-22 00:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint