最新成果

关于北极星


北极星团队隶属于中科院信工所,是一支工程、科研、实战结合紧密的网络安全研究力量。团队主要包括四个研究方向:
1、高级威胁检测发现与溯源,挂靠网络威胁分析研究室(九室),网络攻防研究室(十室)进行招生与培养;
2、人工智能与信息内容安全,挂靠认知安全研究室(六室)进行招生与培养;
3、威胁情报与智能对抗,挂靠网络攻防研究室(十室)。
4、智能系统安全,挂靠网络攻防研究室(十室)进行招生培养。

动态

2024.12.21 论文"Unveiling Deepfakes with Latent Diffusion Counterfactual Explanations."被ICASSP(CCF-B)录用

2024.12.10 论文"MUN:Image Forgery Localization Based on M3 Encoder and UN Decoder."被AAAI(CCF-A)录用

2024.9.26 论文"A Vulnerability-Driven Gym for Training Autonomous Cyber Agents with Reinforcement Learning."被UIC(CCF-C)录用

2024.6.17 论文"Modeling Spoof Noise by De-spoofing Diffusion and its Application in Face Anti-spoofing."被IJCB(CCF-C)录用

2024.5.23 论文"MetaTKG++: Learning evolving factor enhanced meta-knowledge for temporal knowledge graph reasoning."被PR(CCF-B)录用

2024.5.16 论文"Chain-of-History Reasoning for Temporal Knowledge Graph Forecasting."被ACL-Findings(CCF-B)录用

2024.5.19 论文"Semantics Fusion of Hierarchical Transformers for Multimodal Named Entity Recognition."被ICIC(CCF-C)录用

2024.3.13 论文"GAN Inversion for Image Editing via Unsupervised Domain Adaptation."被ICME(CCF-B)录用

2024.3.13 论文"Learning Spatiotemporal Inconsistency via Thumbnail Layout for Face Deepfake Detection."被IJCV(CCF-A)录用

2023.10 论文"Spoof-guided Image Decomposition for Face Anti-spoofing."被会议PRCV 2023(CCF-C)录用

2023.8 论文"Towards Open-Set APT Malware Classification under Few-Shot Setting."被会议Globecom 2023(CCF-C)录用

2023.6 论文"Cross-architecture distillation for face recognition."被会议ACM MM 2023(CCF-A)录用

2023.5 论文"TALL: Thumbnail Layout for Deepfake Video Detection."被会议ICCV 2023(CCF-A)录用

2023.5 论文"Modeling Spoof Noise by De-spoofing Diffusion and its Application in Face Anti-spoofing."被会议IJCB 2023(CCF-C)录用

2023.5 论文"AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection."被会议SciSec 2023(IIE-C)录用

2023.5 论文"Rumor Detection with Diverse Counterfactual Evidence."被会议KDD 2023(CCF-A)录用

2023.4 论文"Prism: Real-Time Privacy Protection Against Temporal Network Traffic Analyzers."被期刊TIFS(CCF-A)录用

2023.4 论文"Payload Level Graph Attention Network for Web Attack Traffic Detection."被期刊ICCS(IIE-B)录用

2023.2 论文"Masked Relation Learning for DeepFake Detection."被期刊TIFS(CCF-A)录用

2023.2 论文"StochasticFormer: Stochastic Modeling for Weakly Supervised Temporal Action Localization."被期刊TIP(CCF-A)录用

2022.11 论文"Grouped Knowledge Distillation for Deep Face Recognitionn."被会议AAAI 2022(CCF-A)录用

2022.10 论文"A Glimpse of the Whole: Detecting Few-shot Android Malware Encrypted Network Traffic."被会议HPCC 2022 (CCF-C)录用

2022.10 论文"ProGraph: Robust Network Traffic Identification with Graph Propagation."被期刊ToN (CCF-A)录用

2022.10 论文"MetaTKG: Learning Evolutionary Meta-Knowledge for Temporal Knowledge Graph Reasoning."被会议EMNLP 2022 (CCF-B)录用

2022.09 论文"High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree."被会议MILCOM 2022 (IIE-B)录用

2022.09 论文"Robust Network Traffic Identification with Graph Matching."被期刊Computer Networks (CCF-B)录用

2022.09 论文"OW-TAL: Learning Unknown Human Activities for Open-World Temporal Action Localization."被期刊PR (CCF-B)录用

2022.06 论文"Dynamic Graph Modeling for Weakly-Supervised Temporal Action Localization."被会议ACM MM 2022 (CCF-A)录用

2022.06 论文"Action Shuffling for Weakly Supervised Temporal Localization."被期刊TIP (CCF-A)录用

2022.05 论文"TwinNet: Twin Structured Knowledge Transfer Network for Weakly Supervised Action Localization."被期刊MIR 录用

最新成果

Security

2025 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS,SPEECH,AND SIGNAL PROCESSING (ICASSP 2025)

Unveiling Deepfakes with Latent Diffusion Counterfactual Explanations

Chen Yang, Bo Peng, Jing Dong, Xiaoyu Zhang

CCF-B

2024.12.21

Security

AAAI Conference on Artificial Intelligence (AAAI 2025)

MUN:Image Forgery Localization Based on M3 Encoder and UN Decoder

Yaqi Liu, Shuhuan Chen, Haichao Shi, Xiao-Yu Zhang, Song Xiao, Qiang Cai

CCF-A

2024.12.10

Security

IEEE International Conference on Ubiquitous Intelligence and Computing(UIC)

A Vulnerability-Driven Gym for Training Autonomous Cyber Agents with Reinforcement Learning

Weixia Cai, Huashan Chen, Han Miao, Feng Liu, Yong Zhang, Xiaojia Yang

CCF-C

2024.9.26

Security

IEEE International Joint Conference on Biometrics (IJCB)

Modeling Spoof Noise by De-spoofing Diffusion and its Application in Face Anti-spoofing

Bin Zhang, Xiangyu Zhu, Xiaoyu Zhang, Zhen Lei

CCF-C

2024.6.17

Security

IEEE International Conference on Multimedia and Expo (ICME 2024)

GAN Inversion for Image Editing via Unsupervised Domain Adaptation

Siyu Xing, Chen Gong, Hewei Guo, Xiao-Yu Zhang, Xinwen Hou, Yu Liu

CCF-B

2024.3.13

Security

Pattern Recognition

MetaTKG++: Learning evolving factor enhanced meta-knowledge for temporal knowledge graph reasoning

Yuwei Xia, Mengqi Zhang, Qiang Liu, Shu Wu, Xiao-Yu Zhang

CCF-B

2024.5.23

Security

Findings of the Association for Computational Linguistics ACL 2024

Chain-of-History Reasoning for Temporal Knowledge Graph Forecasting

Yuwei Xia, Ding Wang, Qiang Liu, Liang Wang, Shu Wu, Xiao-Yu Zhang

CCF-B

2024.5.16

Security

Intelligent Computing Technology and Applications

Semantics Fusion of Hierarchical Transformers for Multimodal Named Entity Recognition

Zhao Tong, Qiang Liu, Haichao Shi, Yuwei Xia, Shu Wu & Xiao-Yu Zhang

CCF-C

2024.5.19

Security

IEEE International Conference on Multimedia and Expo (ICME 2024)

GAN Inversion for Image Editing via Unsupervised Domain Adaptation

Siyu Xing, Chen Gong, Hewei Guo, Xiao-Yu Zhang, Xinwen Hou, Yu Liu

CCF-B

2024.3.13

Security

International Journal of Computer Vision (IJCV)

Learning Spatiotemporal Inconsistency via Thumbnail Layout for Face Deepfake Detection

Yuting Xu, Jian Liang, Lijun Sheng, Xiao-Yu Zhang

CCF-A

2024.3.13

Computer Vision

The 6th Chinese Conference on Pattern Recognition and Computer Vision (PRCV 2023)

Spoof-guided Image Decomposition for Face Anti-spoofing

Bin Zhang, Xiangyu Zhu, Xiaoyu Zhang, Shukai Chen, and Zhen Lei

CCF-C

2023.08.23

Computer Vision

IJCB 2023

Modeling Spoof Noise by De-spoofing Diffusion and its Application in Face Anti-spoofing

Bin Zhang, etc.

CCF-C
Computer Vision

ICCV 2023

TALL: Thumbnail Layout for Deepfake Video Detection

Yuting Xu, etc.

CCF-A
Computer Vision

ACM MM 2023

Cross-architecture distillation for face recognition

Weisong Zhao, etc.

CCF-A
Network Security

Globecom 2023

Towards Open-Set APT Malware Classification under Few-Shot Setting

Huaifeng Bao, etc.

CCF-C
Network Security

SciSec 2023 2023

AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection

Han Miao, etc.

IIE-C
Data Mining

29TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD 2023)

Rumor Detection with Diverse Counterfactual Evidence

Kaiwei Zhang, Junchi Yu, Haichao Shi, Jian Liang, Xiao-Yu Zhang*

CCF-A

2023.05.17

Network Security

IEEE Transactions on Information Forensics and Security. (TIFS) 2023

Prism: Real-Time Privacy Protection Against Temporal Network Traffic Analyzers

Wenhao Li, Xiao-Yu Zhang*, Huaifeng Bao, Binbin Yang, Zhaoxuan Li, Haichao Shi, Qiang Wang

CCF-A

2023.04.13

Computer Vision

IEEE Transactions on Information Forensics and Security. (TIFS) 2023

Masked Relation Learning for DeepFake Detection

Ziming Yang, Jian Liang, Yuting Xu, Xiao-Yu Zhang, and Ran He

CCF-A

2023.02.14

Computer Vision

IEEE Transactions on Image Processing. (TIP) 2023

StochasticFormer: Stochastic Modeling for Weakly Supervised Temporal Action Localization

Haichao Shi; Xiao-Yu Zhang and Changsheng Li

CCF-A

2023.02.11

Computer Vision

The 27th AAAI Conference on Artificial Intelligence (AAAI-2022)

Grouped Knowledge Distillation for Deep Face Recognition

Weisong Zhao, Xiangyu Zhu, Kaiwen Guo, Xiao-Yu Zhang* and Zhen Lei

CCF-A

2022.11.19

Network Security

The 24th IEEE International Conference on High Performance Computing and Communications (HPCC-2022)

A Glimpse of the Whole: Detecting Few-shot Android Malware Encrypted Network Traffic

Wenhao Li, Xiao-Yu Zhang*, Huaifeng Bao, Qiang Wang, Haichao Shi and Zhaoxuan Li

CCF-C

2022.10.24

Network Security

IEEE/ACM Transcations on Networking. (ToN) 2022

ProGraph: Robust Network Traffic Identification with Graph Propagation

Wenhao Li, Xiao-Yu Zhang*, Huaifeng Bao, Haichao Shi and Qiang Wang

CCF-A

2022.10.15

Knowledge Graph

Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing. (EMMLP) 2022

MetaTKG: Learning Evolutionary Meta-Knowledge for Temporal Knowledge Graph Reasoning

Yuwei Xia, Mengqi Zhang, Qiang Liu*, Shu Wu and Xiao-Yu Zhang

CCF-B

2022.10.07

Network Security

Computer Networks. (CN) 2022

Robust Network Traffic Identification with Graph Matching

Wenhao Li, Xiao-Yu Zhang*, Baohuai Feng, Qiang Wang and Zhaoxuan Li

CCF-B

2022.09.17

Network Security

Military Communications Conference (MILCOM), 2022

High-Efficient and Few-Shot Adaptive Encrypted Traffic Classification With Deep Tree

Qiang Wang, Wenhao Li, Huaifeng Bao, Zixian Tang, Wen Wang*, Feng Liu, Lingyun Ying.

IIE-B

2022.09.10

Computer Vision

Pattern Recognition. (PR) 2022

OW-TAL: Learning Unknown Human Activities for Open-World Temporal Action Localization

Yaru Zhang, Xiao-Yu Zhang and Haichao Shi

CCF-B

2022.09.04

Computer Graphics

The IEEE International Conference on Multimedia & Expo (ICME2022)

A Novel Stereo Matching Pipeline with Robustness and Unfixed Disparity Search Range

Jiazhi Liu and Feng Liu

CCF-B

2022.08.26

Computer Vision

ACM MM 2022

Dynamic Graph Modeling for Weakly-Supervised Temporal Action Localization

Haichao Shi, Xiao-Yu Zhang, Changsheng Li, Lixing Gong, Yong Li, Yongjun Bao

CCF-A

2022.06.30

Computer Vision

IEEE Transactions on Image Processing. (TIP) 2022

Action Shuffling for Weakly Supervised Temporal Localization

Xiao-Yu Zhang; Haichao Shi; Changsheng Li and Xinchu Shi

CCF-A

2022.06.13