Sitemap
A list of all the posts and pages found on the site. For you robots out there, there is an XML version available for digesting as well.
Pages
Posts
Future Blog Post
Published:
This post will show up by default. To disable scheduling of future posts, edit config.yml and set future: false.
Blog Post number 4
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Headings are cool
You can have many headings
Aren’t headings cool?
Blog Post number 3
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Headings are cool
You can have many headings
Aren’t headings cool?
Blog Post number 2
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Headings are cool
You can have many headings
Aren’t headings cool?
Blog Post number 1
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Headings are cool
You can have many headings
Aren’t headings cool?
portfolio
Portfolio item number 1
Short description of portfolio item number 1
Portfolio item number 2
Short description of portfolio item number 2 
publications
Traffic Jam Prediction Based on Analysis of Residents Spatial Activities
Published in Computer Information and Big Data Applications (CIBDA), 2020
GIS, logistic regression
Recommended citation: Lv, Z., Fu, H., Tang, W., & Chen, X. (2020, April). Traffic jam prediction based on analysis of residents spatial activities. In 2020 International Conference on Computer Information and Big Data Applications (CIBDA) (pp. 37-40). IEEE.
Download Paper
A recursive DNS identification method based on top level domain resolution log
Published in High Technology Letters, 2023
recursive domain name system (DNS), feature recognition, unsupervised feature selection, clustering algorithm
Quicksolver: A lightweight malicious domains detection system based on adaptive autoencoder
Published in Conference on Local Computer Networks (LCN), 2024
malicious domains detection
Recommended citation: Wan, W., Wang, K., Wei, J., Gong, L., Huang, P., Fu, H., & Fu, Y. (2023, October). Quicksolver: A lightweight malicious domains detection system based on adaptive autoencoder. In 2023 IEEE 48th Conference on Local Computer Networks (LCN) (pp. 1-4). IEEE.
Download Paper
Malicious Domain Name Detection Method Based on Enhanced Embedded Feature Hypergraph Learning
Published in Journal of Computer Research and Development, 2024
malicious domain name, hypergraph learning, decision tree, embedded coding, spatial statistical feature
Recommended citation: Wei Jinxia, Long Chun, Fu Hao, Gong Liangyi, Zhao Jing, Wan Wei, Huang Pan. Malicious Domain Name Detection Method Based on Enhanced Embedded Feature Hypergraph Learning[J]. Journal of Computer Research and Development, 2024, 61(9): 2334-2346. DOI: 10.7544/issn1000-1239.202330117
Download Paper
Robust Malicious Domain Detection Based on Spatio-Temporal Hypergraph Networks
Published in International Symposium on Parallel and Distributed Processing with Applications, ISPA, 2024
malicious domains detection
Recommended citation: Gong, L., Lv, K., Long, C., Fu, H., Wang, H., Wan, W., & Yang, W. (2024, October). Robust Malicious Domain Detection Based on Spatio-Temporal Hypergraph Networks. In 2024 IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA) (pp. 2038-2045). IEEE.
Download Paper
Malicious Domain Detection Technology Based on Semantic Graph Learning
Published in Journal of Computer Research and Development, 2025
malicious domain, semantic graph learning, attention mechanism, graph neural network, self-evolution
Recommended citation: Fu Hao, Long Chun, Gong Liangyi, Wei Jinxia, Huang Pan, Lin Yanzhong, Sun Degang. Malicious Domain Detection Technology Based on Semantic Graph Learning[J]. Journal of Computer Research and Development, 2025, 62(9): 2298-2314. DOI: 10.7544/issn1000-1239.202440375
Download Paper
Flow Microelement-Driven Traffic Relationship Analysis: Robust Detection of Malicious Encrypted Traffic
Published in IEEE Transactions on Information Forensics and Security, 2025
Network Intrusion Detection
Recommended citation: Fu H, Sun D, Wei J, et al. Flow Microelement-Driven Traffic Relationship Analysis: Robust Detection of Malicious Encrypted Traffic[J]. IEEE Transactions on Information Forensics and Security, 2025.
Download Paper
ShellSight-LLM: Detecting Successful Webshell Intrusions via Optimized LLM
Published in EAI International Conference on Digital Forensics & Cyber Crime, 2025
Webshell, Intrusion Detection, Network Security, Large Language Model.
Cryptomining Traffic Detection via Statistical Filtering and Deep Learning
Published in IFIP Working Group 11.9 on Digital Forensics, 2026
Cryptojacking, Encryption traffic, Deep learning, LSTM.
talks
Conference Proceeding talk 3 on Relevant Topic in Your Field
Published:
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.
teaching
Teaching experience 1
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Heading 1
Heading 2
Heading 3
Teaching experience 2
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.
