Blank6

  • Junzhou Zhao,Pinghui Wang*,Wei Zhang,Zhaosong Zhang,Maoli Liu,Jing Tao,John C.S. Lui. Tracking Influencers in Decaying Social Activity Streams with Theoretical Guarantees. IEEE/ACM Transactions on Networking 2024.(中国计算机学会A类期刊)
  • Hongbin Pei, Yuheng Xiong, Pinghui Wang, Jing Tao, Jialun Liu, Huiqi Deng, Jie Ma, Xiaohong Guan. Memory Disagreement: A Pseudo-Labeling Measure from Training Dynamics for Semi-supervised Graph Learning.TheWebConf (or WWW) 2024 (中国计算机学会A类会议)
  • Hongbin Pei,Taile Chen,Chen A,Huiqi Deng,Jing Tao,Pinghui Wang,Xiaohong Guan. HAGO-Net: Hierarchical Geometric Massage Passing for Molecular Representation Learning. AAAI 2024 (中国计算机学会A类会议)
  • Tao Duan,Junzhou Zhao, Shuo Zhang, Jing Tao, and Pinghui Wang. Representation Learning of Tangled Key-Value Sequence Data for Early Classification.ICDE 2024.(中国计算机学会A类会议)
  • Jie Ma,Jun Liu,Qi Chai,Pinghui Wang, Jing Tao.Diagram Perception Networks for Textbook Question Answering via Joint Optimization.IJCV 2024.(中国计算机学会A类期刊)
  • Runze Lei,Pinghui Wang*, Junzhou Zhao, Lin Lan,Jing Tao,Chao Deng,Junlan Feng,Xidian Wang,Xiaohong Guan.Federated Learning over Coupled Graphs.Accepted for IEEE Transactions on Parallel and Distributed Systems. (中国计算机学会A类期刊)
  • Pinghui Wang*,Chengjin Yang,Dongdong Xie,Junzhou Zhao,Hui Li,Jing Tao,Xiaohong Guan.An Effective and Differentially Private Protocol for Secure Distributed Cardinality Estimation. SIGMOD 2023.(中国计算机学会A类会议)
  • Shuo Zhang,Junzhou Zhao*,Pinghui Wang*,Tianxiang Wang,Zi Liang,Jing Tao,Yi Huang,Junlan Feng.Multi-Action Dialog Policy Learning from Logged User Feedback.AAAI 2023.(中国计算机学会A类会议)
  • Jing Tao,Ken Cao,Teng Liu.Traffic Matrix Prediction Based on Cross Aggregate GNN. CyberSciTech / Computing and Applications for Cyber Internet of Things (Cyber-IoT) 2023.
  • Tao, J., Peng, J., Liu, T., Li, Y., Tian, R., & Wu, C. Balanced Hashgraph Based on Dynamic MCMC: Efficient, Practical and Compatible. In 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)
  • Juxiang Zeng, Pinghui Wang, Lin Lan, Junzhou Zhao, Feiyang Sun, Jing Tao, Junlan Feng, Min Hu and Xiaohong Guan. "Accurate and Scalable Graph Neural Networks for Billion-Scale Graphs". Accepted for ICDE 2022. (中国计算机学会A类会议)
  • Peng Jia,Pinghui Wang,Yuchao Zhang,Xiangliang Zhang,Jing Tao,Jianwei Ding,Xiaohong Guan,Don Towsley:Accurately Estimating User Cardinalities and Detecting Super Spreaders Over Time.IEEE Transactions on Knowledge and Data Engineering 2022.(中国计算机学会A类期刊)
  • Jing Tao, Ting Han, Ruidong Li.Deep-Reinforcement-Learning-Based Intrusion Detection in Aerial Computing Networks.IEEE Network 35(4):(2021)(最具影响力期刊)
  • Yuanming Zhang,Jing Tao, Shuo Zhang, Yuchao Zhang, Pinghui Wang.A machine learning based approach for user privacy preservation in social networks. Peer-to-Peer Networking and Applications. 14(3)(2021)
  • Junzhou Zhao, Pinghui Wang, Chao Deng, Jing Tao.Temporal Biased Streaming Submodular Optimization.KDD 2021(中国计算机学会A类会议)
  • Jing Tao,A. Chen, Kai Liu, Kailiang Chen, Fengyuan Li, Peng Fu.Recommendation Method of Honeynet Trapping Component Based on LSTM. DASC/PiCom/CBDCom/CyberSciTech 2021
  • ​​​​​​Rundong Li,Pinghui Wang,Peng Jia,Xiangliang Zhang,Jing Tao,Ye Yuan,Xiaohong Guan.“Approximately Counting Butterflies in Large Bipartite Graph Streams”. Accepted for IEEE Transactions on Knowledge and Data Engineering . (中国计算机学会A类期刊)
  • Peng Jia,Pinghui Wang,Junzhou Zhao,Ye Yuan,Jing Tao,Xiaohong Guan.“LogLog Filter: Filtering Cold Items within a Large Range over HigSpeed Data Streams”. ICDE 2021.(中国计算机学会A类会议)
  • Peng Jia,Pinghui Wang,Junzhou Zhao,Jing Tao,Ye Yuan,Xiaohong Guan.“Erasable Virtual HyperLogLog for Approximating Cumulative Distribution over Data Streams”. Accepted for IEEE Transactions on Knowledge and Data Engineering.(中国计算机学会A类期刊)
  • Changyu Wang,Xiaohong Guan,Tao Qin,Pinghui Wang,Jing Tao,Yongwei Meng,Jingyuan Liu.“Addressing the train-test gap on traffic classification combined subflow model with ensemble learning”.Knowledge-Based Systems, 204:106192, 2020.
  • Lin Lan,Pinghui Wang,Xuefeng Du,Kaikai Song,Jing Tao, and Xiaohong Guan.“Node Classification on Graphs with Few-Shot Novel Labels via Meta Transformed Network Embedding”.Accepted for NeurIPS, 2020.(中国计算机学会A类会议)
  • Peng Jia,Pinghui Wang,Yuchao Zhang,Xiangliang Zhang,Jing Tao,Jianwei Ding,Xiaohong Guan, and Don Towsley. “Accurately Estimating User Cardinalities and Detecting Super Spreaders over Time”. Accepted for IEEE Transactions on Knowledge and Data Engineering,2020.(中国计算机学会A类期刊)
  • Junzhou Zhao,Pinghui Wang,Jing Tao,Shuo Zhang,John C.S. Lui.“Continuously Tracking Core Items in Data Streams with Probabilistic Decays”. Accepted for ICDE 2020.(中国计算机学会A类会议)
  • Lin Lan,Pinghui Wang,Junzhou Zhao,Jing Tao,John C.S. Lui, Xiaohong Guan.“Improving Network Embedding with Partially Available Vertex and Edge Content”.Accepted for Information Sciences, 2019.(中国计算机学会B类期刊)
  • Juxiang Zeng,Pinghui Wang,Qiqi Zhao,Jianye Pang,Jing Tao,Xiaohong Guan.“Effectively Linking Persons on Cameras and Mobile Devices on Networks”. Accepted for IEEE Internet Computing‘s special issue: SI: July/Aug 2019 – Live Video Analytics.
  • Nuo Xu,Pinghui Wang,Long Chen,Jing Tao,Junzhou Zhao.“MR-GNN: Multi-Resolution and Dual Graph Neural Network for Predicting Structured Entity Interactions”. Accepted for IJCAI 2019.(中国计算机学会A类会议, 录稿率: 850/4752 = 17.8%)
  • Pinghui Wang,Xiangyu Wang,Jing Tao,Peng Zhang,Xiaohong Guan.“Continuously Distinct Sampling over Centralized and Distributed High Speed Data Streams”.IEEE Transactions on Parallel and Distributed Systems 30(2):300-314,2019.(中国计算机学会A类期刊)​​​​​​​​​​​​​
  • Pinghui Wang,Xiangyu Wang,Jing Tao,Peng Zhang,Xiaohong Guan.“Continuously Distinct Sampling over Centralized and Distributed High Speed Data Streams”.IEEE Transactions on Parallel and Distributed Systems 30(2):300-314,2019.
  • Pinghui Wang, Peng Jia, Jing Tao, and Xiaohong Guan. “Mining Long-Term Stealthy User Behaviors on High Speed Links”. INFOCOM 2018:2051-2059.(中国计算机学会A类会议)​​​​​​​
  • Lin Lan,Pinghui Wang*,Junzhou Zhao,Jing Tao, John C.S. Lui, Xiaohong Guan.“Improving Network Embedding with Partially Available Vertex and Edge Content”. Accepted for Information Sciences, 2019.(中国计算机学会B类期刊)
  • Juxiang Zeng,Pinghui Wang*,Qiqi Zhao,Jianye Pang,Jing Tao,Xiaohong Guan.“Effectively Linking Persons on Cameras and Mobile Devices on Networks”. Accepted for IEEE Internet Computing‘s special issue: SI: July/Aug 2019 – Live Video Analytics.
  • Nuo Xu,Pinghui Wang*,Long Chen,Jing Tao,Junzhou Zhao.“MR-GNN: Multi-Resolution and Dual Graph Neural Network for Predicting Structured Entity Interactions”. Accepted for IJCAI 2019.(中国计算机学会A类会议, 录稿率: 850/4752 = 17.8%)
  • Peng Jia,Pinghui Wang*,Jing Tao,Xiaohong Guan.“A Fast Sketch Method for Mining User Similarities over Fully Dynamic Graph Streams”. Accepted for ICDE 2019,4-page short paper. (CCF Rank A)
  • Pinghui Wang,Peng Jia,Qi Yiyan,Sun Yu,Jing Tao,Xiaohong Guan.“REPT: A Streaming Algorithm of Approximating Global and Local Triangle Counts in Parallel”. Accepted for ICDE 2019.(CCF Rank A)
  • Pinghui Wang, Peng Jia, Xiangliang Zhang, Jing Tao, Xiaohong Guan, Don Towsley. “Utilizing Dynamic Properties of Virtual Sketches to Accurately Estimate User Cardinalities over Time”. Accepted for ICDE 2019. (CCF Rank A)
  • Pinghui Wang, Peng Jia, Jing Tao, Xiaohong Guan. “Detecting a Variety of Long-Term Stealthy User Behaviors on High Speed Links”. Accepted for IEEE Transactions on Knowledge and Data Engineering 2018. (CCF Rank A)
  • Pinghui Wang, Junzhou Zhao, Xiangliang Zhang, Jing Tao, Xiaohong Guan. “SNOD: A Fast Sampling Method of Exploring Node Orbit Degrees for Large Graphs”. Accepted for KAIS 2018. (CCF Rank B)
  • Pinghui Wang, Yiyan Qi, Yu Sun, Xiangliang Zhang, Jing Tao, and Xiaohong Guan. “Approximately Counting Triangles in Large Graph Streams Including Edge Duplicates with a Fixed Memory Usage”. PVLDB 2018. (中国计算机学会A类会议)
  • Pinghui Wang, Feiyang Sun, Jing Tao, Xiaohong Guan, Albert Bifet. “Predicting Attributes and Friends of Mobile Users From AP-Trajectories”. Accepted for Information Sciences 2018. (CCF Rank B)
  • Pinghui Wang, Junzhou Zhao, Xiangliang Zhang,  Zhenguo Li,  Jiefeng Cheng,  John C.S. Lui, Don Towsley, Jing Tao, and Xiaohong Guan. “MOSS-5: A Fast Method of Approximating Counts of 5-Node Graphlets in Large Graphs”. IEEE Transactions on Knowledge and Data Engineering  30(1): 73-86, 2018. (中国计算机学会A类期刊)
  • Jing Tao, Pinghui Wang, Xiaohong Guan, Wenjun Hu. AL-bitmap: Monitoring Network Trafc Activity Graphs on High Speed Links[J]. Information Sciences. 2017, Volume 408, Pages 162–175. ( IF:3.364)
  • Jing Tao, Yan Zhang, Pengfei Cao, Zheng Wang, Qiqi Zhao:An Android Malware Detection System Based on Behavior Comparison Analysis. ICA3PP 2017: 387-396
  • Jing Tao, Qiqi Zhao, Pengfei Cao, Zheng Wang, Yan Zhang:APK-DFS: An Automatic Interaction System Based on Depth-First-Search for APK. ICA3PP 2017: 420-430
  • Pinghui Wang, Feiyang Sun, Di Wang, Jing Tao, Xiaohong Guan, Albert Bifet:
    Inferring Demographics and Social Networks of Mobile Device Users on Campus From AP-Trajectories. WWW (Companion Volume) 2017: 139-147
  • Pinghui Wang, Yiyan Qi, John C.S. Lui, Don Towsley, Junzhou Zhao, and Jing Tao. “Inferring Higher-Order Structure Statistics of Large Networks From Sampled Edges”. Accepted for IEEE Transactions on Knowledge and Data Engineering 2017. (中国计算机学会A类期刊.)
  • Jianfeng Li, Xiaobo Ma, Junjie Zhang, Jing Tao, Pinghui Wang, and Xiaohong Guan. “Mining Repeating Pattern in Packet Arrivals: Metrics, Models, and Applications”. Information Sciences, 408: 1-22, 2017. (Impact Factor: 3.364)
  • Jianfeng Li, Jing Tao, Xiaobo Ma, Junjie Zhang, Xiaohong Guan. Modeling Repeating Behaviors in Packet Arrivals: Detection and Measurement[C].  in the Proceedings of the 34th IEEE International Conference on  Computer Communications (INFOCOM), 2015. (中国计算机学会认定的A类会议)(Acceptance rate: 316/1640=19%)
  • Xiaobo Ma, Junjie Zhang, Jing Tao*, Jianfeng Li, Jue Tian, Xiaohong Guan. DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache Footprints[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(11):1906~1921 (SCI源刊: 807UC, IF:2.236)
  • Xiaobo Ma, Junjie Zhang, Zhenhua Li, Jianfeng Li, Jing Tao, Xiaohong Guan, John C.S. Lui, Don Towsley. Accurate DNS Query Characteristics Estimation via Active Probing[J]. Journal of Network and Computer Applications, January 2015, Volume 47, Pages72–84. (SCI:AG7WK,IF:1.772)
  • Wenjun Hu, Jing Tao, Xiaobo Ma, Wenyu Zhou, Shuang Zhao, Ting Han. MIGDroid: Detecting APP-Repackaging Android Malware via Method Invocation Graph[C]. The 23rd International Conference on Computer Communications and Networks (ICCCN 2014 ) , Shanghai, China, 2014:1-7.  (EI: 201444140171)
  • Pinghui Wang, Xiaohong Guan, Junzhou Zhao, Jing Tao, Tao Qin. A New Sketch Method for Measuring Host Connection Degree Distribution[J]. IEEE Transactions on Information Forensics & Security, 2014, 9(6):948–960. (SCI: 807UC, IF:2.236)
  • 胡炀,陶敬,刘林峰,李剑锋,胡文君,梁肖. 一种Android 平台下高性能透明文件加密机制 [J].西安交通大学学报,2016年3月,50(3).
  • Pinghui Wang, Xiaohong Guan, Don Towsley, Jing Tao*. Virtual indexing based methods for estimating node connection degrees Original Research Article. Computer Networks, 2012, 56(12): 2773-2787 (SCI: 159VS,  IF= 1.282)
  • Jianfeng Li, Xiaobo Ma, Jing Tao*, Xiaohong Guan. Boosting Practicality of DNS Cache Probing:A General Estimator Based on Bayesian Forecasting[C], IEEE International Conference on Communications (ICC), Budapest, Hungrary, 2013:2540-2544.
  • Xiaobo Ma, Jianfeng Li, Jing Tao*, Xiaohong Guan.Towards Active Measurement for DNS Query  Behavior of Botnets[C], IEEE Global Communications Conference (GLOBECOM 2012),  Anaheim,  CA, 2012:845-849.
  • Xiaobo Ma, Xiaohong Guan, Jing Tao*, Qinghua Zheng, Yun Guo, Lu Liu, Shuang Zhao. A Novel IRC Botnet Detection Method Based on Packet Size Sequence[C].  IEEE International Conference on Communications (ICC),  Cape Town, 2010:1-5. (EI:20103213140699)
  • 马小博,陶敬,管晓宏,郑庆华,郭云,刘璐,赵双.一种基于数据包大小序列的IRC 僵尸网络检测方法[C].中国计算机大会,中国天津,2009:300-307
  • Xiaobo Ma, Jiahong Zhu, Zhiyu Wan, Jing Tao, Xiaohong Guan, Qinghua Zheng.  Honeynet-based Collaborative Defense using Improved Highly Predictive Blacklisting Algorithm[C]. the 8th World Congress on Intelligent Control and Automation(WCICA), Jinan,China,2010:1283-1288.(EI:2014313325766)
  • 褚伟波, 管晓宏, 蔡忠闽, 陶敬. 面向互动式网络场景再现的流速控制系统与方法,计算机学报, 2012, 35(7): 1485-1497.
  • 赵双,刘璐,陶敬,马小博.Ring 0级程序行为分析系统的设计与实现[J].计算机工程,2011,37(1):156-158.
  • 陶敬,马小博,赵娟,郑庆华. 基于资源可用性的主机异常检测[J]. 电子科技大学学报,2007,36(6):1449-1452.

    

Blank2

 已授权专利:

  1. 陶敬 李剑锋 马小博 管晓宏 周文瑜 周天 邹孙颖 胡文君,基于DNS缓存探测的恶意代码感染主机规模估计方法,专利号:ZL201310224336.1
  2. 陶敬  折波  管晓宏  韩婷  黄旭昌  王智, 一种并行存储高速网络流量的快速定位方法, 专利号:ZL 201310136662.7
  3. 陶敬 马小博 李剑锋 管晓宏 周文瑜 周天 邹孙颖 胡文君,一种恶意代码感染主机规模估计系统和方法,专利号ZL201310224310.7
  4. 管晓宏 郑庆华 马小博 陶敬 赵双 刘璐 李剑锋. 基于数据包序列特征的IRC僵尸网络检测系统和检测方法专利号:ZL 201010013660.5 
  5. 陶敬 田决 马小博 李剑锋 韩婷 邹孙颖 胡文君.基于蜜网的协同式主动防御系统专利号:201310500444.7
  6. 陶敬 孙飞扬 管晓宏 刘林峰 田决 王平辉 马小博 李剑锋, 基于Smart Grid的攻击智能捕获系统,专利号: 201510954606.3
  7. 陶敬 孙飞扬 管晓宏 刘林峰 田决 王平辉 马小博 李剑锋, 基于Smart Grid的智能诱骗系统, 专利号:ZL.201510953656.X
  8. 陶敬 孙飞扬 管晓宏 刘林峰 田决 王平辉 马小博 李剑锋,一种智能电网模拟运行系统,专利号:ZL. 201510953519.6
  9. 陶敬 周文瑜 胡文君 赵双 马小博,一种启发式静态识别Android系统恶意代码的方法.专利号:201310443094.5
  10. 陶敬 胡文君 周文瑜 赵双 马小博,一种基于类别分析的Android恶意代码检测方法.专利号:201310443171.7
  11. 陶敬 周文瑜 胡文君 赵双 马小博,一种基于方法调用图的Android恶意软件检测方法 专利号.ZL 201310443173.6
  12. 陶敬 褚伟波 管晓宏. 一种并行存储高速网络流量的快速定位方法.专利号:ZL 20110059203.4
  13. 陶敬 韩婷  管晓宏  黄旭昌 王智 折波,一种网络流量内容提取和分析检索方法,专利号:ZL 201310139368.1
  14. 陶敬 胡文君 周文瑜 赵双 马小博,一种基于函数调用的Android恶意代码检测方法.专利号:ZL 201310443172.1
  15. 陶敬 周文瑜 胡文君 赵双 马小博,一种Android恶意代码检测方法.专利号:ZL 201310443173.6
  16. 陶敬 韩婷 王智 折波 黄旭昌 胡炀 梁肖 陈雅静 赵雨森,一种网络流量还原回放方法。专利号:ZL201410230483.4
  17. 陶敬 马小博 邹孙颖 李剑锋 孙飞扬 梁肖.一种基于出租车GPS数据挖掘的打车/接单POI推荐系统及方法 - 201610078172.X 
  18. 韩婷 陶敬 王平辉 马小博 管晓宏 李剑锋 张岩,一种基于流分类实现的自主可控可靠组播传输方法,授权号: 201610256805.1
  19. 王平辉 贾鹏 王翔宇 孙飞扬 齐逸岩 曾菊香 许诺 兰林 管晓宏 陶敬 韩婷,面向大规模网络流量的分布式社会网络结构快速挖掘系统,申请号:201811136073.8
  20. 王平辉 孙飞扬 贾鹏 王翔宇 齐逸岩 曾菊香 许诺 兰林 管晓宏 陶敬 韩婷,无线网络中的用户流量预测系统,申请号:201811136066.8
  21. 王平辉 王翔宇 孙飞扬 贾鹏 齐逸岩 曾菊香 许诺 兰林 管晓宏 陶敬 韩婷,一种基于内容相似度实时计算的网络数据分类推荐系统,申请号:201811136059.8
  22. 王平辉 齐逸岩 贾鹏 孙飞扬 王翔宇 曾菊香 许诺 兰林 管晓宏 陶敬 韩婷,一种基于数据流的异常用户检索系统,申请号:201811136056.4

 

 已申请专利:

 

  1. 陶敬 李忠义 陈奕光 王莞尔 郝传洲 詹旭娜 常跃 郑宁一种异常文件访问行为监控方法和装置. 申请号:201911094271.7
  2. 陶敬 林辉 詹旭娜 陈奕光 郑宁 常跃 郝传洲 王莞尔一种非法文件上传检测方法. 申请号:201911068936.7
  3. 陶敬 郝传洲 郑宁 詹旭娜 王莞尔 陈奕光 常跃一种在线文件非法下载检测方法和装置.申请号:201911068789.3
  4. 陶敬 李阳 常跃 詹旭娜 王莞尔 郝传洲 郑宁 陈奕光一种检测服务器中异常进程的方法与装置. 申请号201911068920.6
  5. 陶敬 赵粤征 王莞尔 王晨旭 马小博 常跃 陈奕光 郑宁,詹旭娜,郝传洲, 一种异常登录检测方法. 申请号201910580760.7 
  6. 陶敬 樊志甲 郑宁 马小博 王晨旭 郝传洲 常跃 陈奕光 王莞尔 詹旭娜一种  海量日志提权行为检测及分类方法. 申请号:201910580763.0
  7. 陶敬 刘凯 潜禹桥 王悦 韩婷 张远鸣,一种基于虚拟化的攻击智能诱骗系统.申请号:201910206624.1
  8. 陶敬 潜禹桥 刘凯 韩婷,一种基于SDN网络的流量捕获方法,申请号:201910206622.2
  9. 陶敬 王平辉 曹宇 潜禹桥 柳哲 孙立远 林杰,一种智能化的应用流量识别特征自动挖掘方法与系统,申请号:201810803379.8
  10. 陶敬 王平辉 韩婷 王铮 李佳璇 郑宁 栾庆鑫 白云鹏 孙立远 柳哲 林杰,一种基于内核的应用程序获取超级权限行为检测方法与系统,申请号:201811066101.3 
  11. 陶敬 王平辉 曹宇 郑宁 潜禹桥 孙立远 柳哲 林杰,一种基于随机游走的流量特征自动生成方法与系统,申请号:201810803376.4
  12. 陶敬 王平辉 韩婷 李佳璇 王铮 郑宁 栾庆鑫 白云鹏 孙立远 柳哲 林杰,一种免超级用户权限的进程行为监控装置与方法,申请号:201811066049.1
  13. 陶敬 王平辉 韩婷 白云鹏 王铮 李佳璇 郑宁 栾庆鑫 孙立远 柳哲 林杰,一种移动应用程序动态加载行为监控方法及装置,申请号: 201811066029.4
  14. 陶敬 王平辉 韩婷 栾庆鑫 王铮 李佳璇 郑宁 白云鹏 孙立远 柳哲 林杰, 一种基于内核的文件操作行为监控方法及装置, 申请号:201811066041.5
  15. 陶敬 赵琪琪 王平辉 韩婷 曹鹏飞 王铮 张岩 柳哲 孙立远, 一种APK自动触发工具,申请号:201711220729.X
  16. 陶敬 张岩 王平辉 韩婷 曹鹏飞 王铮 赵琪琪 孙立远 柳哲,一种基于多运行环境行为比对的安卓恶意应用检测系统,申请号:201711217805.1
  17. 陶敬 李剑锋 蔡启申, 僵尸网络检测方法和控制器.申请号: 201410186366.2
  18. 王平辉 孙飞扬 王迪 管晓宏 陶敬 张岩 曹鹏飞 贾鹏 胡小雨 曹宇 兰林,一种基于时空轨迹的用户属性与社会网络检测系统.申请号: 201611139349.9
  19. 王平辉 孙飞扬 王迪 管晓宏 陶敬 张岩 曹鹏飞 贾鹏 胡小雨 曹宇 兰林.一种基于时空轨迹和社会网络的用户属性预测系统 申请号:201611141121.3
  20. 王平辉 陶敬 梁肖 陈雅静 孙飞扬 兰林 贾鹏 田栋文 柳哲 孙立远,一种基于深度学习的用户密码猜测系统 申请号:201710305120.6
  21. 王平辉 陶敬 陈雅静 管晓宏 梁肖 孙飞扬 兰林 贾鹏 潜禹桥 孙立远 柳哲,一种基于社交信息的用户属性预测方法与系统 申请号:201710305848.9
  22. 王平辉 齐逸岩 孙雨 管晓宏 陶敬 张岩 曹鹏飞 贾鹏 胡小雨 曹宇 兰林,一种基于大规模网络流数据的异常检测系统 申请号:201710880542.6
  23. 王平辉 李娜 陶敬 韩婷 郝传洲 张姗 许诺 孙飞扬 张晓明 林杰,基于语义结构特征分析的异构标签融合系统 申请号:201711469839.X
  24. 王晨旭 赵志远 饶巍 陶敬 马小博 秦涛, 一种流式在线日志解析方法,申请号:201810805285.4
  25. 王晨旭 王阳 赵志远 秦栋 管晓宏 秦涛 陶敬,一种基于拓扑结构信息的大规模网络匹配方法,申请号:201810124813.X
  26. 王晨旭 姜一鸣 秦栋 陶敬 秦涛 马小博 管晓宏,一种电子商务中基于区块链技术的隐私保护交易方法,申请号:201810124778.1
  27. 王晨旭 尚莘纯 秦涛 陶敬 马小博 管晓宏,基于结构洞理论的城市道路网电动汽车充电站部署方法,申请号:201910181849.6
  28. 管晓宏 李卫 赵玉平 秦涛 陶敬 马小博 王平辉,一种针对内外网安全访问的控制方法与系统,申请号:201910683115.8
  29. 王平辉 韩婷 胡小雨 陶敬 许诺 张珊,一种基于主题信息的类别预测方法及装置,申请号:201910368367.1
  30. 王平辉 陈龙 许诺 王悦 孙飞扬 胡小雨 曾立柱 段凯馨 王翔宇 韩婷 陶敬 管晓宏,一种基于关联图的法条推荐预测系统及方法,申请号:201910142623.5

 

 

Blank1

 

  1. 企业网僵尸网络捕获与监控系统,登记号 2010SR013273,登记日期2010323
  2. MalBox程序行为自动分析系统,登记号2010SR014004,登记日期2010329
  3. Honeynet维护与监管系统,登记号 2010SR013272,登记日期2010323