{"id":144,"date":"2020-12-03T15:41:09","date_gmt":"2020-12-03T15:41:09","guid":{"rendered":"http:\/\/dmslab.hkg03.bdysite.com\/?page_id=144"},"modified":"2021-07-28T06:20:34","modified_gmt":"2021-07-28T06:20:34","slug":"yipeng-wang","status":"publish","type":"page","link":"http:\/\/www.dmslab.cn\/?page_id=144","title":{"rendered":"Yipeng Wang \u738b\u4e00\u9e4f"},"content":{"rendered":"\n<p> Professor, Ph.D. Supervisor<br> Faculty of Information Technology, Beijing University of Technology   <br> <strong>Email:\u00a0 \u00a0 \u00a0\u00a0<\/strong>wangyipeng@bjut<em>.<\/em>edu.cn <br> <strong>Address: \u00a0<\/strong>#100 Pingleyuan,\u00a0Chaoyang District, Beijing, China, 100124  <\/p>\n\n\n\n<p>Yipeng Wang is currently a Professor with the Faculty of Information Technology Beijing University of Technology, China. He received his Ph.D. degree in computer science from the Institute of Computing Technology, Chinese Academy of Sciences(ICT, CAS) in 2014, and his research is on network security, Internet measurement, Natural language processing, and machine learning, and has one Best Paper Award on his protocol inference technology. <\/p>\n\n\n\n<p><strong> Openings!!\u00a0<\/strong>I am looking for self-motivated and hardworking students and visiting scholars to work with me on exciting topics in network protocol analysis and DNS security. If you are interested in these areas, please send an email to me. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Recent Selected Publication:<\/strong><\/h2>\n\n\n\n<p class=\"has-text-color has-medium-font-size has-vivid-red-color\"> <strong>[Artificial Intelligence]<\/strong> <\/p>\n\n\n\n<ul><li><strong>[IJCAI&#8217;20]\u00a0Gated POS-Level Language Model for Authorship Verification.<\/strong>\u00a0<br>L. Ouyang, Y. Zhang, H. Liu, Y. Chen, and\u00a0<em><strong>Yipeng Wang<\/strong>.\u00a0<br>in<\/em>\u00a0Proceedings of the\u00a0International Joint Conference on Artificial Intelligence\u00a0(IJCAI),\u00a0Yokohama, Japan,\u00a02020.\u00a0Acceptance rate: 592\/4717 = 12.6%.<\/li><li><strong>[AAAI&#8217;20]\u00a0Joint Character Embedding and Adversarial Stability Training to Defend Adversarial Text.<\/strong>\u00a0<br>H. Liu, Y. Zhang,\u00a0<strong>Yipeng Wang<\/strong>, L. Zheng, and Y. Chen.\u00a0<br><em>in<\/em>\u00a0Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence\u00a0(AAAI),\u00a0\u00a0Honolulu, Hawaii, USA,\u00a02020.\u00a0Acceptance rate: 1591\/7737 = 20.6%.<\/li><li><strong>[IJCNN&#8217;20]\u00a0Unified Graph Embedding-Based Anomalous Edge Detection.<\/strong>\u00a0<br>L. Ouyang, Y. Zhang,\u00a0<strong>Yipeng Wang<\/strong>.\u00a0<br><em>in<\/em>\u00a0Proceedings of the\u00a0\u00a0International Joint Conference on Neural Networks (IJCNN),\u00a0Glasgow, UK,\u00a02020.\u00a0Acceptance rate: 1134\/1989 = 57%.<\/li><li><strong>[AAAI&#8217;19]\u00a0Translating with Bilingual Topic Knowledge for Neural Machine Translation.<\/strong>\u00a0<br>X. Wei, Y. Hu,\u00a0L. Xing,\u00a0<strong>Yipeng Wang<\/strong>, and L. Gao.\u00a0<br><em>in<\/em>\u00a0Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence\u00a0(AAAI),\u00a0\u00a0Honolulu, Hawaii, USA,\u00a02019.\u00a0Acceptance rate: 1150\/7095 = 16.2%.<\/li><li><strong>[Neurocomputing&#8217;15]\u00a0Update Vs. upgrade: Modeling with indeterminate multi-class active learning.<\/strong>\u00a0<strong><br><\/strong>X. Zhang, S. Wang, X. Zhu, X. Yun, G. Wu, and\u00a0<strong>Yipeng Wang<\/strong>.<br>ElsevierNeurocomputing (Impact Factor: 2.083), 2015.\u00a0<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-medium-font-size has-vivid-red-color\"><strong>[DNS Security]<\/strong><\/p>\n\n\n\n<ul><li><strong>[TIFS&#8217;20]\u00a0Khaos: An Adversarial Neural Network DGA with High Anti-Detection Ability.<\/strong><br>X. Yun, J. Huang,\u00a0<strong>Yipeng Wang<\/strong>(Corresponding author),\u00a0T. Zang, Y. Zhou, and Y. Zhang.<br>in\u00a0\u00a0IEEE Transactions on Information Forensics and Security (TIFS). 15: 2225 &#8211; 2240 (2020). .<\/li><li><strong>[IJCNN&#8217;20]\u00a0<\/strong><em><strong>A Feature Ensemble-based Approach to Malicious Domain Name Identification from Valid DNS Responses<\/strong><\/em><strong>.<\/strong>\u00a0<br>C. Zhao, Y. Zhang, and\u00a0<strong>Yipeng Wang<\/strong><em>.\u00a0<br>in<\/em>\u00a0Proceedings of the\u00a0International Joint Conference on Neural Networks (IJCNN),\u00a0Glasgow, UK,\u00a02020.\u00a0Acceptance rate:\u00a01134\/1989 = 57%.<\/li><li><strong>[ICNP&#8217;19]\u00a0A Linguistic-based Stacking\u00a0Approach to Disposable Domain Detetion.<br><\/strong>Y. Zeng, Y. Zhang, T. Zang, X. Chen, and\u00a0<strong>Yipeng Wang<\/strong>.\u00a0<br>\u00a0in\u00a0Proceedings of the 27th\u00a0IEEE International Conference on Network Protocol (ICNP),\u00a0Chicago, USA,\u00a02019.\u00a0<\/li><li><strong>[ICC&#8217;19]\u00a0A Comprehensive Measurement Study of Domain-squatting Abuse.<br><\/strong>Y. Zeng, T. Zang,\u00a0Y. Zhang, X. Chen, and\u00a0<strong>Yipeng Wang<\/strong>(Corresponding author).\u00a0\u00a0<br>in\u00a0Proceedings of the\u00a053rd IEEE International Conference on Communications (ICC),\u00a0\u00a0Shanghai, China,\u00a02019.\u00a0Acceptance rate: 39%.<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-medium-font-size has-vivid-red-color\"><strong>[Networking]<\/strong><\/p>\n\n\n\n<ul><li><strong>[ICNP&#8217;19]\u00a0Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach.<\/strong><br>Y. Chen, T. Zang,\u00a0Y. Zhang,\u00a0Y. Zhou, and\u00a0<strong>Yipeng Wang<\/strong>.\u00a0<br>in\u00a0Proceedings of the 27th\u00a0IEEE International Conference on Network Protocol (ICNP),\u00a0Chicago, USA,\u00a02019.\u00a0Acceptance rate: 29\/121 = 13.7%.<\/li><li><strong>[WCNC&#8217;18]\u00a0A Cascade Forest Approach to Application Classification of Mobile Traces.\u00a0<br><\/strong>Y. Liu, S. Zhang, B. Ding, X. Li, and\u00a0<strong>Yipeng Wang<\/strong>(Corresponding author).\u00a0<br><em>in<\/em>\u00a0Proceedings of the\u00a0IEEE Wireless Communications and Networking Conference (WCNC),\u00a0\u00a0Barcelona, Spain,\u00a0April 2018.<\/li><li><strong>[JNCA&#8217;17]\u00a0A Nonparametric Approach to the Automated Protocol Fingerprint Inference.<br>Yipeng Wang<\/strong>,\u00a0Xiaochun Yun,\u00a0Yongzheng Zhang, Liwei Chen and Guangjun Wu.\u00a0\u00a0<br>Elsevier\u00a0Journal of Network and Computer Applications\u00a0(Impact Factor: 3.500), 99C\u00a0(2017) pp. 1-9.<\/li><li><strong>[ComNet&#8217;17]\u00a0Rethinking Robust and Accurate Application Protocol Identification.<br>YiPeng Wang<\/strong>,\u00a0Xiaochun Yun,\u00a0Yongzheng Zhang, Liwei Chen and Tianning Zang.\u00a0<br>\u00a0Elsevier\u00a0Journal of Computer Networks (Impact Factor: 2.516),\u00a0129P1 (2017) pp. 64-78.<\/li><li><strong>[ToN&#8217;16]\u00a0A Semantics-Aware Approach to the Automated Network Protocol\u00a0Identification.<\/strong>\u00a0<br>Xiaochun Yun,\u00a0<strong>Yipeng Wang<\/strong>\u00a0(Corresponding author),\u00a0\u00a0Yongzheng Zhang, and Yu Zhou.\u00a0<br>IEEE\/ACM Transactions on Networking (ToN),\u00a024 (1), 583 &#8211; 595,\u00a02016.\u00a0<\/li><li><strong>[ICNP&#8217;15]\u00a0Rethinking Robust and Accurate Application Protocol Identification: A Nonparametric Approach.<\/strong>\u00a0<br><strong>Yipeng Wang<\/strong>,\u00a0Xiaochun Yun,\u00a0and\u00a0Yongzheng Zhang.\u00a0<br>in\u00a0Proceedings of the 23th IEEE International Conference on Network Protocols\u00a0(<a rel=\"noreferrer noopener\" href=\"http:\/\/icnp15.cs.ucr.edu\/\" target=\"_blank\">ICNP<\/a>),\u00a0\u00a0San Francisco, CA,\u00a0November\u00a0\u00a02015.\u00a0Acceptance rate: 38\/187 = 20.3%.<\/li><li><strong>[SECURECOMM&#8217;15]\u00a0A Markov Random Field Approach to Automated Protocol Signature Inference.<\/strong>\u00a0<br>Yongzheng Zhang, Tao Xu,\u00a0<strong>Yipeng Wang\u00a0<\/strong>(Corresponding author),\u00a0Jianliang Sun,\u00a0and\u00a0Xiao-Yu Zhang.\u00a0<br>in\u00a0Proceedings of the\u00a011th EAI International Conference on Security and Privacy in Communication Networks\u00a0(SECURECOMM), \u00a0Dallas, TX,\u00a0October\u00a02015.\u00a0Acceptance rate: 30\/108 = 28%.<\/li><li><strong>[ICNP&#8217;12]\u00a0A Semantics Aware Approach to Automated Reverse Engineering Unknown Protocols.\u00a0<br>Yipeng Wang<\/strong>, Xiaochun Yun, M. Zubair Shafiq,\u00a0Liyan Wang,\u00a0Alex X. Liu, Zhibin Zhang, Danfeng(Daphne) Yao, Yongzheng Zhang, and Li Guo.\u00a0<br><em>in<\/em>\u00a0Proceedings of the 20th IEEE International Conference on Network Protocols\u00a0(<a rel=\"noreferrer noopener\" href=\"https:\/\/icnp12.cs.umd.edu\/\" target=\"_blank\">ICNP<\/a>),\u00a0Austin, Texas, October 2012.\u00a0Acceptance rate: 30\/131 = 22.9%.\u00a0BEST PAPER AWARD<\/li><li><strong>[ACNS&#8217;11]\u00a0Inferring Protocol State Machine from Network Traces: A Probabilistic Method.<br>Yipeng Wang<\/strong>, Zhibin Zhang, Danfeng(Daphne)\u00a0Yao, Buyun Qu, and Li Guo.<br><em>in<\/em>\u00a0Proceedings of the 9th International Conference on Applied Cryptography and Network Security\u00a0(ACNS).\u00a0Nerja (Malaga), Spain,\u00a0June 2011.\u00a0Acceptance rate:\u00a031\/172\u00a0=18%.<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Professor, Ph.D. Supervisor Faculty of Information Tech &hellip; <\/p>\n<p class=\"link-more\"><a href=\"http:\/\/www.dmslab.cn\/?page_id=144\" class=\"more-link\">\u7ee7\u7eed\u9605\u8bfb<span class=\"screen-reader-text\">\u201cYipeng Wang \u738b\u4e00\u9e4f\u201d<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":7,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"http:\/\/www.dmslab.cn\/index.php?rest_route=\/wp\/v2\/pages\/144"}],"collection":[{"href":"http:\/\/www.dmslab.cn\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.dmslab.cn\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.dmslab.cn\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.dmslab.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=144"}],"version-history":[{"count":3,"href":"http:\/\/www.dmslab.cn\/index.php?rest_route=\/wp\/v2\/pages\/144\/revisions"}],"predecessor-version":[{"id":481,"href":"http:\/\/www.dmslab.cn\/index.php?rest_route=\/wp\/v2\/pages\/144\/revisions\/481"}],"up":[{"embeddable":true,"href":"http:\/\/www.dmslab.cn\/index.php?rest_route=\/wp\/v2\/pages\/7"}],"wp:attachment":[{"href":"http:\/\/www.dmslab.cn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}