北极星团队隶属于中科院信工所,是一支工程、科研、实战结合紧密的网络安全研究力量。团队主要包括三个研究方向:
1、高级威胁检测发现与溯源,指导老师包括刘峰研究员(博导),王文副研究员,挂靠信安国重进行招生与培养;
2、人工智能与模式识别(包括行为检测、图网络挖掘、深度伪造),指导老师包括张晓宇副研究员(博导),挂靠第二研究室进行招生与培养;
3、网络对抗理论与技术研究。指导老师包括陈华山副研究员、王鹏老师,挂靠第六研究室进行招生与培养。
关于北极星

动态
2023.8 论文"Spoof-guided Image Decomposition for Face Anti-spoofing."被会议PRCV 2023(CCF-C)录用
2023.5 论文"Rumor Detection with Diverse Counterfactual Evidence."被会议KDD 2023(CCF-A)录用
2023.4 论文"Prism: Real-Time Privacy Protection Against Temporal Network Traffic Analyzers."被期刊TIFS(CCF-A)录用
2023.4 论文"Payload Level Graph Attention Network for Web Attack Traffic Detection."被期刊ICCS(IIE-B)录用
2023.2 论文"Masked Relation Learning for DeepFake Detection."被期刊TIFS(CCF-A)录用
2023.2 论文"StochasticFormer: Stochastic Modeling for Weakly Supervised Temporal Action Localization."被期刊TIP(CCF-A)录用
2022.11 论文"Grouped Knowledge Distillation for Deep Face Recognitionn."被会议AAAI 2022(CCF-A)录用
2022.10 论文"A Glimpse of the Whole: Detecting Few-shot Android Malware Encrypted Network Traffic."被会议HPCC 2022 (CCF-C)录用
2022.10 论文"ProGraph: Robust Network Traffic Identification with Graph Propagation."被期刊ToN (CCF-A)录用
2022.10 论文"MetaTKG: Learning Evolutionary Meta-Knowledge for Temporal Knowledge Graph Reasoning."被会议EMNLP 2022 (CCF-B)录用
2022.09 论文"High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree."被会议MILCOM 2022 (IIE-B)录用
2022.09 论文"Robust Network Traffic Identification with Graph Matching."被期刊Computer Networks (CCF-B)录用
2022.09 论文"OW-TAL: Learning Unknown Human Activities for Open-World Temporal Action Localization."被期刊PR (CCF-B)录用
2022.06 论文"Dynamic Graph Modeling for Weakly-Supervised Temporal Action Localization."被会议ACM MM 2022 (CCF-A)录用
2022.06 论文"Action Shuffling for Weakly Supervised Temporal Localization."被期刊TIP (CCF-A)录用
2022.05 论文"TwinNet: Twin Structured Knowledge Transfer Network for Weakly Supervised Action Localization."被期刊MIR 录用
最新成果
Computer Vision
The 6th Chinese Conference on Pattern Recognition and Computer Vision (PRCV 2023)
Spoof-guided Image Decomposition for Face Anti-spoofingBin Zhang, Xiangyu Zhu, Xiaoyu Zhang, Shukai Chen, and Zhen Lei
2023.08.23
Data Mining
29TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD 2023)
Rumor Detection with Diverse Counterfactual EvidenceKaiwei Zhang, Junchi Yu, Haichao Shi, Jian Liang, Xiao-Yu Zhang*
2023.05.17
Network Security
IEEE Transactions on Information Forensics and Security. (TIFS) 2023
Prism: Real-Time Privacy Protection Against Temporal Network Traffic AnalyzersWenhao Li, Xiao-Yu Zhang*, Huaifeng Bao, Binbin Yang, Zhaoxuan Li, Haichao Shi, Qiang Wang
2023.04.13
Computer Vision
IEEE Transactions on Information Forensics and Security. (TIFS) 2023
Masked Relation Learning for DeepFake DetectionZiming Yang, Jian Liang, Yuting Xu, Xiao-Yu Zhang, and Ran He
2023.02.14
Computer Vision
IEEE Transactions on Image Processing. (TIP) 2023
StochasticFormer: Stochastic Modeling for Weakly Supervised Temporal Action LocalizationHaichao Shi; Xiao-Yu Zhang and Changsheng Li
2023.02.11
Computer Vision
The 27th AAAI Conference on Artificial Intelligence (AAAI-2022)
Grouped Knowledge Distillation for Deep Face RecognitionWeisong Zhao, Xiangyu Zhu, Kaiwen Guo, Xiao-Yu Zhang* and Zhen Lei
2022.11.19
Network Security
The 24th IEEE International Conference on High Performance Computing and Communications (HPCC-2022)
A Glimpse of the Whole: Detecting Few-shot Android Malware Encrypted Network TrafficWenhao Li, Xiao-Yu Zhang*, Huaifeng Bao, Qiang Wang, Haichao Shi and Zhaoxuan Li
2022.10.24
Network Security
IEEE/ACM Transcations on Networking. (ToN) 2022
ProGraph: Robust Network Traffic Identification with Graph PropagationWenhao Li, Xiao-Yu Zhang*, Huaifeng Bao, Haichao Shi and Qiang Wang
2022.10.15
Knowledge Graph
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing. (EMMLP) 2022
MetaTKG: Learning Evolutionary Meta-Knowledge for Temporal Knowledge Graph ReasoningYuwei Xia, Mengqi Zhang, Qiang Liu*, Shu Wu and Xiao-Yu Zhang
2022.10.07
Network Security
Computer Networks. (CN) 2022
Robust Network Traffic Identification with Graph MatchingWenhao Li, Xiao-Yu Zhang*, Baohuai Feng, Qiang Wang and Zhaoxuan Li
2022.09.17
Network Security
Military Communications Conference (MILCOM), 2022
High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep TreeQiang Wang, Wenhao Li, Huaifeng Bao, Zixian Tang, Wen Wang*, Feng Liu, Lingyun Ying.
2022.09.10
Computer Vision
Pattern Recognition. (PR) 2022
OW-TAL: Learning Unknown Human Activities for Open-World Temporal Action LocalizationYaru Zhang, Xiao-Yu Zhang and Haichao Shi
2022.09.04
Computer Graphics
The IEEE International Conference on Multimedia & Expo (ICME2022)
A Novel Stereo Matching Pipeline with Robustness and Unfixed Disparity Search RangeJiazhi Liu and Feng Liu
2022.08.26
Computer Vision
ACM MM 2022
Dynamic Graph Modeling for Weakly-Supervised Temporal Action LocalizationHaichao Shi, Xiao-Yu Zhang, Changsheng Li, Lixing Gong, Yong Li, Yongjun Bao
2022.06.30
Computer Vision
IEEE Transactions on Image Processing. (TIP) 2022
Action Shuffling for Weakly Supervised Temporal LocalizationXiao-Yu Zhang; Haichao Shi; Changsheng Li and Xinchu Shi
2022.06.13