
Tutorials
With the rapid development of large-scale models, particularly the continuous advancement of cutting-edge artificial intelligence technologies, the field of network traffic analysis is increasingly exploring how to integrate these emerging techniques with traditional traffic analysis approaches to enhance network traffic perception and analysis capabilities. This report summarizes the evolution of network traffic perception technologies in three stages: (1) the transition from binary data to embedding-based representation learning; (2) the evolution of models and architectures improving analytical capability and generalization performance; and (3) the reflection and reconstruction of traffic representations, identifying potential biases and exploring more reliable paradigms for traffic representation and learning.
Chief Professor and Second-Class Professor at Southeast University, and recipient of a National High-Level Talent Program. Dean of the School of Cyber Science and Engineering and Director of the Key Laboratory of Computer Network and Information Integration, Ministry of Education. Standing Council Member of the China Cyberspace Security Association. Research focuses on traffic analysis, active defense, and cybersecurity. Has undertaken 40+ research projects over the past five years, including National Key R&D Program and NSFC projects. Awards include the National Outstanding Teacher in Cybersecurity, the First Prize of the National Teaching Achievement Award, the Top Ten Scientific Advances of Jiangsu Province (2024), the First Prize of the Jiangsu Science and Technology Award (2021), and three Huawei “Spark Awards” (2023–2025).
Associate Professor and Master’s/Ph.D. Supervisor at the School of Cyber Science and Engineering, Southeast University; Chief Scientist of the Young Scientists Project under the National Key R&D Program of China. Deputy Director of the Jiangsu Cyberspace Security Capability R&D Committee. Research focuses on full-traffic network behavior analysis, cyber attack and defense, and cybersecurity deployment optimization. Has published 50+ papers in TDSC, TIFS, TON, INFOCOM, and others. Awards include the Youth Science and Technology Award of the Jiangsu Cyberspace Security Society, the Jiangsu “Double Innovation” Doctoral Talent Program, and the Xiaomi Young Scholar Award.
