1.Zehui Zhang, Futai Zou*,Jianan Hong, Libo Chen, Ping Yi. 2024."Detection and Analysis of Broken Access Control Vulnerabilities in App-Cloud Interaction in IoT". IEEE Internet of Things Journal.(SCI一区,IF10.6)
2.Yuelin Hu, Futai Zou*,Jiajia Hang, Xin Sun,Yilei Wang. 2024."LLM-TIKG: Threat Intelligence Knowledge Graph Construction Utilizing Large Language Model". Computers & Security.(CCF B,SCI IF5.6)
3.Kaida Jiang, Futai Zou*, Hongjun Huang, Liwen Zheng, and Haochen Zhai. 2024. "Open DGML: Intrusion Detection Based on Open-Domain Generation Meta-Learning". Applied Sciences 14, no. 13: 5426. (SCI IF2.5)
4.Yilei Wang, Yuelin Hu, Wenliang Xu, and Futai Zou*. 2024. "Multi-Identity Recognition of Darknet Vendors Based on Metric Learning". Applied Sciences 14, no. 4: 1619. (SCI IF2.5)
5.Bolun Wu, Futai Zou*, Mingyi Huang, Xin Sun, and Jiajia Han. 2024. "Enhancing Runtime Application Self-Protection with Unsupervised Deep Learning". 20th EAI International Conference on Security and Privacy in Communication Systems (SecureComm 2024), Dubai,United Arab Emirates,28-30 October, 2024.(CCF-C)
1.Bolun Wu, Futai Zou*, Chengwei Zhang, Tangda Yu, Yun Li. Multi-field relation mining for malicious HTTP traffic detection based on attention and cross network. Journal of Information Security and Applications, Vol.73,2023.https://doi.org/10.1016/j.jisa.2023:73,103411 (SCI,IF4.96)
2.Futai Zou, Yuelin Hu, Wenliang Xu, Yue Wu. Link Prediction-Based Multi-Identity Recognition of Darknet Vendors, The 25th International Conference on Information and Communications Security (ICICS2023),18-20 November, 2023, Nanka,China.(CCF-C,acceptance rate of 18.09%=38/210)
3.Bolun Wu, Futai Zou*, Ping Yi,Yue Wu, Liang Zhang. “SlicedLocator: Code Vulnerability Locator Based on Sliced Dependence Graph”, Computers & Security, 2023.(CCF B, SCI IF5.6)
1. 邹福泰,俞汤达,许文亮. 基于隐马尔科夫模型的加密恶意流量检测[J]. 软件学报, 2022, 33(7): 2683–2698.
2.Yi Qin, Tianming Zheng, Yue Wu*, Futai Zou*, "Tracing Tor Hidden Service Through Protocol Characteristics", Proceeding of The 31st International Conference on Computer Communications and Networks (ICCCN 2022),Virtual Conference,2022.(CCF-C)
3.Yi Qin, Jiahe Wu, Futai Zou*, Yue Wu*, “Breaking Tor’s Anonymity by Modifying Cell’s Command”, Proceeding of The 27th IEEE Symposium on Computers and Communications (IEEE ISCC 2022),Rhodes,Greece,2022.(CCF-C)
4. Bolun Wu, Futai Zou*," Code Vulnerability Detection Based on Deep Sequence and Graph Models: A Survey", Security and Communication Networks. Volume 2022. https://doi.org/10.1155/2022/1176898.(SCI)(CCF-C)
5. Haochen Zhai, Futai Zou*, Junhua Tang, Yue Wu. "Towards high transferability on neural network for black-box adversarial attacks", EAI 18th International Conference on Security and Privacy in Communication Systems (SecureComm 2022), 2022.(CCF-C)
6. Jingcheng Yang, Hongwei Li, Shuo Shao, Futai Zou, Yue Wu. "FS-IDS: A framework for intrusion detection based on few-shot learning." Computer & Security.2022.122:102899.(CCF-B)
7. Mingjie Nie, Futai Zou*, Yi Qin, Tianming Zheng,Yue Wu, "QUIC-CNN: Website Fingerprinting for QUIC Traffic in Tor Network", Proceeding of The 24rd IEEE International Conference on High Performance Computing and Communications (HPCC2022), Chengdu, China, December 2022. (CCF-C,acceptance rate of 17.6%)
1. Chengwei Zhang, Yunlu Xu, Zhanzhan Cheng, Shiliang Pu*, Yi Niu, Fei Wu, Futai Zou*, "SPIN: Structure-Preserving Inner Offset Network for Scene Text Recognition", Proceedings of the 35th AAAI Conference on Artificial Intelligence (AAAI 2021), 2021.(CCF-A)
2. Wenliang Xu, Futai Zou*,"Obfuscated Tor Traffic Identification Based on Sliding Window", Security and Communication Networks.Volume 2021: 5587837:1-5587837:11.(SCI)(CCF-C)
3. Jingsong Li, Junhua Tang, Jianhua Li, Futai Zou,"Deep Reinforcement Learning for Intelligent Computing and Content Edge Service in ICN-based IoV",ICC Workshops 2021: 1-7,2021.
4. Yuheng Wei, Futai Zou*, "Automatic Generation of Malware Threat Intelligence from Unstructured Malware Traces", EAI 17th International Conference on Security and Privacy in Communication Systems (SecureComm 2021), 2021.(CCF-C)
5. Bolun Wu, Yuanhang Xu, Futai Zou*. "Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs", IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom2021). (CCF-C)
6. Futai Zou, Dechao Meng, Wentao Gao, Linsen Li. "DePL: Detecting Privacy Leakage in DNS-over-HTTPS Traffic", IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom2021). (CCF-C)
7. Futai Zou, Qianying Shen, and Yuzong Hu. "Word-Map: Using Community Detection Algorithm to Detect AGDs", The 24th Information Security Conference (ISC2021). (CCF-C)
8. Futai Zou, Yundong Ren, Jiachen Zhu, Junhua Tang, "Detecting Data Leakage in DNS Traffic Based on Time Series Anomaly Detection", Proceeding of The 23rd IEEE International Conference on High Performance Computing and Communications (HPCC2021), Haikou, China, December 2021. (CCF-C)
9. Futai Zou, Haochen Zhai, "Browser Fingerprinting Identification Using Incremental Clustering Algorithm Based on Autoencoder ", Proceeding of The 23rd IEEE International Conference on High Performance Computing and Communications (HPCC2021), Haikou, China, December 2021. (CCF-C)
10. 邹福泰, 谭越, 王林, 蒋永康. 基于生成对抗网络的僵尸网络检测[J]. 通信学报, 2021, 42(7): 95-106.
11. Chenqi Xie, Ping Yi, Baowen Zhang and Futai Zou, “DeepMark: Embedding Watermarks into Deep Neural Network Using Pruning”, Proceeding of IEEE 33rd International Conference on Tools with Artificial Intelligence(ICTAI2021),2021. (CCF-C)
1. Xiaoshi Liang, Futai Zou*, Linsen Li, Ping Yi. "Mobile terminal identity authentication system based on behavioral characteristics". International Journal of Distributed Sensor Networks.Vol.16, No.1, 2020. (SCI)
2. Yuzong Hu, Futai Zou*, Linsen Li, Ping Yi. "Traffic Classification of User Behaviors in Tor, I2P,ZeroNet, Freenet", IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom2020), Guangzhou, China ,IEEE, pp.418-424, 2020.(CCF-C)
3. Jingcheng Yang, Haowei Ye, Futai Zou*. "pyDNetTopic: A Framework for Uncovering What Darknet Market Users Talking About" , EAI 16th International Conference on Security and Privacy in Communication Systems (SecureComm 2020),Springer,Cham, pp. 118–139, 2020. (CCF-C)
4. Qianying Shen, Futai Zou*. "Detecting Dictionary Based AGDs Based On Community Detection ", EAI 16th International Conference on Security and Privacy in Communication Systems (SecureComm 2020),Springer,Cham, pp. 42–48, 2020.
5. Henrui Zhang, Futai Zou*. "A Survey of The Dark Web and Dark Market Research" Proceedings of IEEE 6th International Conference on Computer and Communications (IEEE ICCC 2020), Chengdu, December 11-14,2020.
6. Kaida Jiang,Yifei Gao,Jiawei Xiao,Futai Zou. "Uinfied Identity Authentication System Based on Blockchain" , Proceedings of IEEE 6th International Conference on Computer and Communications (IEEE ICCC 2020), Chengdu, December 11-14,2020.
7. Lingxuan Zhang, Linsen Li, Futai Zou, Jiachao Niu. "Quantitatively Assessing the Cyber-to-Physical Risk of Industrial Cyber-Physical Systems", Proceedings of the 2020 on Great Lakes Symposium on VLSI (GLSVLSI 2020), Virtual Event, China, September 7-9, 2020. (CCF-C)
1. Cheng Huang, Ping Yi, Futai Zou, Yao Yao, Wei Wang, and Ting Zhu, "CCID: Cross-Correlation Identity Distinction Method for Detecting Shrew DDoS" Wireless Communications and Mobile Computing, vol. 2019, pp. 1-9, February 21, 2019. (SCI)
2. Kedi Wang, Ping Yi, Futai Zou, Yue Wu, “Generating Adversarial Samples With Constrained Wasserstein Distance”. IEEE Access, Vol. 7: 136812-136821, September 2019.(SCI)
3. Chengwei Zhang, Yunlu Xu, Zhanzhan Cheng, Yi Niu, Shiliang Pu, Fei Wu, Futai Zou, "Adversarial Seeded Sequence Growing for Weakly-Supervised Temporal Action Localization", Proceedings of the 27th ACM International Conference on Multimedia (ACMMM 2019), Nice, France, October 2019. (CCF-A)
4. Yongkang Jiang, Shenghong Li, Yue Wu, and Futai Zou,“A Novel Image-Based Malware Classification Model Using Deep Learning”, Proceeding of the 26th International Conference on Neural Information Processing (ICONIP 2019) ,Sydney, Australia, Dec. 12-15,2019.(CCF-C)
5. Gubei Yin, Junhua Tang, Futai Zou, Yue Wu and Jianghua Li, "Controller Based Detection Scheme of Interest Flooding Attack in Named Data Networking," Proceeding of IEEE 5th International Conference on Computer and Communications (ICCC 2019), Chengdu, China, 2019, pp. 1628-1633.
6. Jiachen Zhu,Futai Zou*, “Detecting Malicious Domains Using Modified SVM Model”, Proceeding of The 21th IEEE International Conference on High Performance Computing and Communications (HPCC2019), Zhangjiajie, China, August 2019. (CCF-C)
7. Yue Bi, Yue Wu, Cunqing Hua, Futai Zou, “Evolutionary Anti-jamming Game in Non-Orthogonal Multiple Access System”, Proceeding of The 2019 IEEE Global Communications Conference (GLOBECOM2019), USA, December 2019. (CCF-C)
8. Tangda Yu, Futai Zou*, Linsen Li, Ping Yi ,“An Encrypted Malicious Traffic Detection System Based On Neural Network”, Proceeding of the 11th International Conference on Cyber-enabled distributed computing and knowledge discovery(CyberC2019), Guilin,China, October 2019.
1. Ping Yi, Yuxiang Guan, Futai Zou, Yao Yao, Wei Wang, and Ting Zhu, “Web Phishing Detection Using a Deep Learning Framework”, Wireless Communications and Mobile Computing, Vol.2018, pp 1-9, September 2018. (SCI)
2. Futai Zou*, Linsen Li, Yue Wu, and Jianhua Li,Siyu Zhang,Kaida Jiang*. "Detecting Domain-Flux Malware using DNS Failure Traffic." International Journal of Software Engineering and Knowledge Engineering, Vol.28, No.2, pp. 151-173,2018.(SCI)(CCF-C)
3. Boren He , Futai Zou*, Yue Wu. “Multi-SDN Based Cooperation Scheme for DDoS Attack Defense” , Proceeding of Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC2018), Shanghai, Oct.18-19, 2018.
4. Jianming Zhang, Futai Zou*, Junru Zhu. “Android Malware Detection Based on Deep Learning” , Proceeding of the 4th IEEE International Conference on Computer and Communications (IEEE ICCC2018), Chengdu, Dec.7-10,2018.
5. Liang Fang, Guangtao Xue, Feng Lyu, Hao Sheng, Futai Zou, Minglu Li, “Intelligent Large-Scale AP Control with Remarkable Energy Saving in Campus WiFi System”, Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems(ICPADS 2018), Singapore, December 11-13, 2018.(CCF C)
6. 易平,王科迪,黄程,顾双驰,邹福泰,李建华,“人工智能对抗攻击研究综述”,上海交通大学学报,Vol.52,No.10, 2018, pp.1298-1306.
1. Futai Zou, Siyu Zhang, Linsen Li, Li Pan, and Jianhua Li. "Detecting Malware based on Expired Command-and-Control Traffic" International Journal of Distributed Sensor Networks.Vol.13, No. 7, 2017. (SCI)
1. Futai Zou, Siyu Zhang, Bei Pei,Li Pang, Linsen Li, Jianhua Li."Survey on Domain Name System Security". Proceedings of the First IEEE International Conference on Data Science in Cyberspace(IEEE DSC2016), Changsha, June 13-16,2016.
2. Futai Zou, Yuxiang Guan, Bei Pei, Li Pan, Linsen Li. "Web Phishing Detection Based on Graph Mining". Proceedings of IEEE 2th International Conference on Computer and Communications (IEEE ICCC 2016), Chengdu, October 14-17,2016.
3. Zihao Wang, Futai Zou*, Bei Pei,Weijia He,Li Pan, Zhaochong Mao, Linsen Li. "Detecing Malicious Server based On Server-to-Server Realation Graph". Proceedings of the first IEEE International Conference on Data Science in Cyberspace(IEEE DSC2016), Changsha, June 13-16,2016.
4. Zhedi Zhang, Futai Zou*, Li Pan, Bei Pei, Jianhua Li ."Detection of Zombie Followers in SINA Weibo". Proceedings of IEEE 2th International Conference on Computer and Communications (IEEE ICCC 2016), Chengdu, October 14-17,2016.
5. Yechao Xia, Li Pan, Liang Shi, Futai Zou. "Attribute Credibility based Sybil Group Detection in Online Social Networks”. Proceedings of the first IEEE International Conference on Data Science in Cyberspace(IEEE DSC2016), Changsha, June 13-16,2016.
1. Futai Zou, Siyu Zhang, Weixiong Rao, and Ping Yi, "Detecting Malware Based on DNS Graph Mining", International Journal of Distributed Sensor Networks, Volume 2015 ,2015. (SCI)
1. EricKe Wang, Futai Zou."A New Graph Drawing Scheme for Social Network" .The Scientific World Journal , Volume 2014,2014.(SCI)
2. Futai Zou, Shiyu Zhang, Tianqi Wang, Li Pan. "A Survey of Android Mobile Platform Security", Proceedings of the 10th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM2014),Beijing, September 26-28, 2014.
1. Futai Zou, Shiyu Zhang, Weixiong Rao. "Hybrid Detection and Tracking of Fast-Flux Botnet on DNS Traffic". China Communication, Vol.10, No.11, pp. 58-69, November 2013. (SCI)
2. 章思宇,邹福泰*,王鲁华,陈铭.基于DNS的隐蔽通道流量检测[J]. 通信学报, 2013, 34(5): 143-151.
1. Tao Cai, Futai Zou*,"Detecting HTTP Botnet with Clusting Network Traffic", Proceedings of the 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM2012),Shanghai, September 21-23, 2012.
2. Daoxin Pan, Wei Bai, Siyu Zhang, Futai Zou*."Detecting Malicious Queries From Search Engine Traffic",Proceedings of the 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM2012),Shanghai, September 21-23, 2012.
1. Ping Yi, Futai Zou, Yan Zou, Zhiyang Wang,"Performance Analysis of Mobile Ad Hoc Networks under Flooding Attacks", Journal of Systems Engineering and Electronics, Vol. 22, No.2 , pp. 334-339, 2011. (SCI)
1. Ping Yi, Yue Wu, Futai Zou, Ning Liu,"A Survey on Security in Wireless Mesh Networks".IETE TECHNICAL REVIEW, Vol. 27,No.1, pp.6-14, January 2010.(SCI&EI)
2. Jiacheng Hong, Ning Liu, Ping Yi, Futai Zou, Qiang Zhai, Securing Wireless Mesh Network with Mobile Firewall, In 2010 International Conference on Wireless Communications and Signal Processing (WCSP2010), Suzhou, China, October 2010.
1. Weixiong Rao, Lei Chen, AW-C. Fu, Hanhua Chen, Futai Zou. “On efficient content matching in distributed pub/sub systems”. Proceedings of the IEEE International Conference on Computer Communications(INFOCOM2009), Paris, France,19-25 April 2009.
1. Futai Zou, Ping Yi, Fanyuan Ma, Jianhua Li. "Using Probabilistic Cache Scheme to Construct the Small World Network". Journal of Harbin Institute of Technology (English).Vol.14: 354-361. 2007. ISSN: 1005-9113.(EI)
2. Ping Yi, Futai Zou, Jiang Xinghao."Multi-agent cooperative intrusion response in mobile adhoc networks". Journal of Systems Engineering and Electronics.Pages: 785-94 ,Vol. 2007(12). 2007. ISSN: 1553-9105.( SCI&EI)
3. Ping YI, Futai Zou, Jianhua Li, “Real-Time Protocol Analysis for Detecting Routing Attacks in Wireless Mesh Networks”, Journal of Computational Information Systems Vol.3,No.6, 2007, pp.2219-2228. (EI)
4. Ping Yi, Futai Zou, Xinghao Jiang, Jianhua Li, “Muti-Agent Cooperative Intrusion Response in Mobile Ad Hoc Networks”, Journal of Systems Engineering and Electronics, Vol.18, No.4, pp.785-794, 2007. (SCI)
5. XinLi Huang,Futai Zou, Fanyuan Ma,“On Targeted Local Immunization in Scale-free Peer-to-Peer Networks,” Journal of Computer Science and Technology(JCST), vol. 22, no. 3, pp. 457-468, 2007.(SCI)
6. Fei Liu,Futai Zou, FanYuan Ma, MingLu Li."Distributed information retrieval method in peer-to-peer network". Journal of Harbin Institute of Technology (New Series), Vol 14, No 6, December, 2007, Page 846-849. ISSN: 1005-9113. (EI检索号:080811110383)
1. Futai Zou, Zengde Wu, Liang Zhang, Fanyuan Ma. "Control DHT Maintenance Costs with Session Heterogeneity", Journal of Zhejiang University (English). Vol. 6A, No. 5, pp.378-386, 2005. (EI)
2. Liang Zhang ,Futai Zou,FanYuan Ma ."KRBKSS: A Keyword Relationship based Keyword-Set Search System for Peer-to-Peer Networks".Journal of Zhejiang University: Science, Vol. 6 A, No. 6, pp.577-582, June 2005. (EI)
1. Futai Zou Yin Li, Liang Zhang, Fanyuan Ma. "SHT: Adaptive DHT Topology Model Based on Session Heterogeneity for Dynamic Network". Proceeding of The Sixth International Conference on Advanced Communication Technology(ICACT2004), Korea,2004. (EI检索号:04278246134)
2. Futai Zou, Yin Li, Liang Zhang, Fanyuan Ma. "CCAN: Cache-based CAN Using the Small World Model." Proceeding of The Fifth International Conference on Web-Age Information Management(WAIM2004), Dalian,China, July 15-17, 2004. ISBN 3-540-22418-1 .(SCI IDS:BAK53)
3. Futai Zou, Shudong Cheng, Liang Zhang, Fanyuan Ma, Junjun Tang. "Using the Linking Model to Understand the Performance of DHT Routing Algorithms". Proceeding of The 2th International Symposium on Parallel and Distributed Processing and Applications(ISPA2004), Hong Kong, China, 13-15 Dec. 2004. ISBN 3-540-24128-0 .(SCI IDS:BBM37)
4. Futai Zou, Yin Li, Liang Zhang, Fanyuan Ma, Minglu Li. "A Novel Approach for Constructing Small World in Structured P2P Systems". Lecture Notes in Computer Science Vol.3251.page 807-810.2004(SCI IDS:BBE85)
5. Yin Li,Futai Zou, Fanyuan Ma, Minglu Li."pXRepository: a peer-to-peer XML repository for Web service discovery".Lecture Notes in Computer Science Vol.3251.Pages: 137-144, 2004 .(SCI IDS:BBE85 )
6. Yin Li,Futai Zou, Fanyuan Ma, Minglu Li. "Build a distributed repository for Web service discovery based on peer-to-peer network". Lecture Notes in Computer Science Vol.3222.Pages: 175-182, 2004.(SCI IDS:BBB67)
1. Futai Zou, Liang Zhang, Yin Li, Fanyuan Ma. "Effect of Links on DHT Routing Algorithms". Lecture Notes on Computer, Springer-Verlag, LNCS 3033, page 308-315. ISSN:0302-9743 2003.(SCI IDS:BAC96)
2023.吴越,秦怡,邹福泰,周纸墨. 一种基于水印的Tor匿名通信双方身份关联系统:中国, ZL202210876834.3 [P].授权日: 2023-11-03.
2023. 邹福泰,谭越,梁晓实,龚子超,李林森. 一种基于层次分析法和灰色关联分析的身份可信评价方法:中国,ZL201910511447.8[P].授权日: 2023-08-08.
2023.邹福泰,秦怡,郑天铭,吴越. 一种基于Tor协议时序特性的隐藏服务追踪系统:中国,ZL2022 1 0876836.2 [P].授权日: 2023-08-04.
2023.邹福泰,蒋永康,吴越. 一种基于深度学习的大规模恶意软件分类系统和方法:中国,ZL2019111547166.6[P].授权日: 2023-06-13.
2023.邹福泰,谭越,梁晓实,李林森,唐俊华. 一种基于区块链的多域身份认证管理系统及方法:中国,ZL201910512296.8[P].授权日: 2023-03-10.
2022.邹福泰,徐源,王帅,杨正宇,孟也迪,朱俊茹.一种基于区块链的可信身份管理系统和方法:中国,ZL201811258603.6[P].授权日: 2022-11-29.
2022.邹福泰,郭万达,任蕴东,吴越,李林森,易平. 一种基于人工智能的WEB高交互蜜罐系统及防攻击方法:中国, ZL202111483818.X [P].授权日: 2022-03-08.
1. 邹福泰,沈倩颖,张晴钊,薛广涛,齐开悦. 一种面向内网的新型漏洞攻击检测系统:中国, ZL201911155283.6 [P].授权日: 2021-10-22.
2. *邹福泰,裘炜程,马兴华,胡秉晖,唐俊华,李林森. 一种基于流量分析的挖矿木马检测系统:中国, ZL201911155285.5[p].授权日: 2021-10-22.
3. 吴越,邹福泰,赵鑫鹏.一种基于长短期记忆神经网络的暗网资源探测系统:中国,ZL201810564633.3[P].授权日: 2021-10-22.
4. 邹福泰,俞汤达,吴越.一种基于深度学习的加密型僵尸网络检测系统及方法:中国,ZL201810563937.8[P].授权日: 2021-10-22.
5. 邹福泰,肖佳伟,高逸飞,孟德超,化存卿,毕越. 一种基于Bro的APT监测系统和方法:中国, ZL201911154671.2 [P].授权日: 2021-08-20
6. *邹福泰,杨正瑭,武永兴,薛广涛,齐开悦. 一种基于智能化威胁情报的网络攻击检测系统和方法:中国, ZL201911154704.3 [P]. 授权日: 2021-08-20.
7. 邹福泰,张成伟,吴越. 一种基于深度学习的恶意HTTP流量检测系统和方法:中国, ZL201911154695.8 [P].授权日: 2021-08-20.
8. *邹福泰,张奕,吴越.一种基于流量分析的P2P僵尸网络检测系统及方法:中国,ZL201810565197.1[P].申请日:2018-06-04. 授权日: 2021-08-20.
9. 邹福泰,俞汤达,李林森,章思宇,姜开达.一种基于深度学习的加密型恶意流量检测系统和方法:中国, ZL201911155282.1 [P]. 授权日: 2021-08-10.
10. 邹福泰,王林,肖佳伟,刘运卓,尹凯涛,吴越. 一种基于流量的自反馈恶意软件监测系统和方法:中国, ZL201911161704.6 [P]. 授权日: 2021-08-03.
11. 邹福泰,张庆儒,赵铭华,张恒瑞,张子瑄.一种基于机器学习的WEB恶意请求深度检测系统及方法:中国,201811331941.8[P].授权日: 2021-03-30.
12. 邹福泰,朱家琛,李林森,吴越.一种基于自反馈学习的大规模恶意域名检测系统及方法:中国,201810563861.9[P].授权日: 2021-02-09.
13. 齐开悦,吴越,贺博仁,邹福泰,刘杉影.一种基于软件定义网络的DDoS攻击检测及防御方法和系统:中国,201810565190.X[P].授权日: 2021-01-01
14. 邹福泰,沈展,沈倩颖,马诗慧,吴越,齐开悦.一种基于自动特征抽取的恶意URL检测系统及其方法:中国,201810563850.0[P].授权日: 2021-01-01
15. 邹福泰,朱宸,熊瑶庭,李林森,吴越,齐开悦,易平.一种基于卷积神经网络的shadowsocks流量检测方法:中国,ZL201810565176.X[P].授权日: 2020-12-11
16. 邹福泰,丁伟莉,裴蓓,潘理,李建华.基于DNS请求周期的恶意域名检测算法:中国,201710092340.5[P].授权日: 2020-05-26
17. 邹福泰,张舒翼,谢伟,童瑶,王佳慧,李建华.一种网络协同防御系统:中国,ZL201610032111.X[ P]. 授权日:2019-08-06
18. 邹福泰,姜开达,章思宇,刘渝娇,李林森,李建华. 一种基于流采样的DDoS检测方法:中国, ZL201610619870.6 [ P]. 授权日:2019-08-06
19. 易平,陈郑珊,吴越,邹福泰.基于认证的无线钓鱼接入点检测方法:中国, ZL201610329754.0[ P]. 授权日:2019-08-02
20. 邹福泰,孙文杰,谭凌霄,刘渝娇.基于Passive DNS迭代聚类的恶意域名检测方法:中国, ZL201610497879.4[ P]. 授权日:2018-12-25
21. 王东晖,邹福泰.对Web服务器群的攻击的检测方法和装置:中国, ZL201410298911.7[ P]. 授权日:2018-09-28
22. 邹福泰,顾亿帆,王佳慧,易平.一种BT流量控制系统和方法:中国, ZL201410648229.6[ P]. 授权日:2018-06-05
23. 邹福泰,徐凯翼,王佳慧,任思君,李建华.基于NetFlow的僵尸网络检测系统与检测方法:中国, ZL 201510058355.0[ P]. 授权日:2018-01-30
24. 邹福泰,刘鹏焜,谷雨昊,易平,李建华.一种基于DNS日志分析的APT攻击检测系统和方法:中国, ZL201410172549.9[ P]. 授权日:2017-10-03
25. 邹福泰,万天琦,易平,吴越.基于云计算的恶意域名检测系统:中国, ZL201410148117.4[ P]. 授权日:2017-02-15
26. 邹福泰,谷宇昊,易平,李建华.基于熵模型的DNS反解攻击的检测系统和方法:中国, ZL201410138182.9[ P]. 授权日:2017-02-15
27. 邹福泰,付毓飞,章思宇,易平.面向Web安全的数据库安全防护方法和系统:中国, ZL201310442701.6[ P]. 授权日:2017-02-08
28. 邹福泰,潘思远,易平,李建华.僵尸网络恶意域名的分布式协同检测系统和方法:中国, ZL201310534381.7[ P]. 授权日:2016-11-30
29. 邹福泰,姚雨石,吴嘉玮.基于关系图的微博僵尸用户检测方法:中国, ZL201310396404.2[ P]. 授权日:2016-08-17
30. 邹福泰,姚雨石,吴嘉玮.一种微博广告用户检测方法:中国, ZL201310410578.X[ P]. 授权日:2016-06-01
31. 邹福泰,白巍,潘道欣,易平.一种基于正则表达式的恶意搜索关键词识别方法:中国, ZL201310401159.X[ P]. 授权日:2016-05-04
32. 邹福泰,白巍,潘道欣,易平.一种基于搜索引擎关键词的主动式蜜罐检测方法:中国, ZL201310332730.7[ P]. 授权日:2016-04-06
33. 邹福泰,李海波,王莉淋,易平.基于域名系统的隐蔽通信方法:中国, ZL201310400983.3[ P]. 授权日:2016-04-06
34. 邹福泰,章思宇,裴蓓,黄道丽.基于P2P的僵尸网络分布式协作检测系统和方法:中国, ZL201310041810.7[ P]. 授权日:2015-09-09
35. 邹福泰,章思宇,裴蓓,黄道丽.一种DHT网络的存储负载均衡方法:中国, ZL201210434973.7[ P]. 授权日:2015-11-25
36. 邹福泰,王鲁华,章思宇,李建华.一种DNS隐蔽信道的检测方法:中国, ZL201210040335.7[ P]. 授权日:2015-07-15
37. 邹福泰,王鲁华,章思宇,李建华.一种DNS拒绝服务攻击的防御方法及装置:中国, ZL201210051749.X[ P]. 授权日:2014-08-06
38. 易平,唐卓凡,李元祥,邹福泰.无线自组织网络中基于位置的数据包转发方法:中国, ZL201110082557.0[ P]. 授权日:2013-12-25
39. 邹福泰,王明政,张亮,何高辉,李建华.对等网络服务原语系统:中国, ZL201010225980.7[ P]. 授权日:2012-08-29
40. 邹福泰,章思宇,张亮,王明政,李建华.带智能缓存的域名解析服务系统及其服务方法:中国, ZL201010131892.0[ P]. 授权日:2012-09-05
41. *邹福泰,张庆儒,赵铭华,张恒瑞,张子瑄.一种基于机器学习的WEB恶意请求深度检测系统及方法:中国,ZL201811331941.8[ P].授权日: 2021-03-30
1.Futai Zou, Chengwei Zhang, Yue Wu, Kaida Jiang,Siyu Zhang,Linsen Li, Xinghao Jiang,Dawu Gu."System for Malicious HTTP Traffic Detection with Multi-Field Relation." U.S. Patent, No. US11483340B2,authorized on October 1, 2022.
2.Futai Zou, Yongkang Jiang, Yue Wu, Ping Yi, Guangtao Xue, Jianhua Li, Weidong Qiu, Cunqing Hua. "Large-Scale Malware Classification System." U.S. Patent, No. US11463473B2, authorized on October 4, 2022.
沪交ICP备20180219