Portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 2 
Published in Computer Information and Big Data Applications (CIBDA), 2020
GIS, logistic regression
Recommended citation: Lv, Z., Fu, H., Tang, W., & Chen, X. (2020, April). Traffic jam prediction based on analysis of residents spatial activities. In 2020 International Conference on Computer Information and Big Data Applications (CIBDA) (pp. 37-40). IEEE.
Download Paper
Published in High Technology Letters, 2023
recursive domain name system (DNS), feature recognition, unsupervised feature selection, clustering algorithm
Published in Conference on Local Computer Networks (LCN), 2024
malicious domains detection
Recommended citation: Wan, W., Wang, K., Wei, J., Gong, L., Huang, P., Fu, H., & Fu, Y. (2023, October). Quicksolver: A lightweight malicious domains detection system based on adaptive autoencoder. In 2023 IEEE 48th Conference on Local Computer Networks (LCN) (pp. 1-4). IEEE.
Download Paper
Published in Journal of Computer Research and Development, 2024
malicious domain name, hypergraph learning, decision tree, embedded coding, spatial statistical feature
Recommended citation: Wei Jinxia, Long Chun, Fu Hao, Gong Liangyi, Zhao Jing, Wan Wei, Huang Pan. Malicious Domain Name Detection Method Based on Enhanced Embedded Feature Hypergraph Learning[J]. Journal of Computer Research and Development, 2024, 61(9): 2334-2346. DOI: 10.7544/issn1000-1239.202330117
Download Paper
Published in International Symposium on Parallel and Distributed Processing with Applications, ISPA, 2024
malicious domains detection
Recommended citation: Gong, L., Lv, K., Long, C., Fu, H., Wang, H., Wan, W., & Yang, W. (2024, October). Robust Malicious Domain Detection Based on Spatio-Temporal Hypergraph Networks. In 2024 IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA) (pp. 2038-2045). IEEE.
Download Paper
Published in Journal of Computer Research and Development, 2025
malicious domain, semantic graph learning, attention mechanism, graph neural network, self-evolution
Recommended citation: Fu Hao, Long Chun, Gong Liangyi, Wei Jinxia, Huang Pan, Lin Yanzhong, Sun Degang. Malicious Domain Detection Technology Based on Semantic Graph Learning[J]. Journal of Computer Research and Development, 2025, 62(9): 2298-2314. DOI: 10.7544/issn1000-1239.202440375
Download Paper
Published in IEEE Transactions on Information Forensics and Security, 2025
Network Intrusion Detection
Recommended citation: Fu H, Sun D, Wei J, et al. Flow Microelement-Driven Traffic Relationship Analysis: Robust Detection of Malicious Encrypted Traffic[J]. IEEE Transactions on Information Forensics and Security, 2025.
Download Paper
Published in EAI International Conference on Digital Forensics & Cyber Crime, 2025
Webshell, Intrusion Detection, Network Security, Large Language Model.
Published in IFIP Working Group 11.9 on Digital Forensics, 2026
Cryptojacking, Encryption traffic, Deep learning, LSTM.
Published:
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.