AI Networking Engineer with five published studies on network security and data synchronization. Specializing in intelligent threat detection and resilient system design, I am seeking to apply my research and development skills to solve complex network infrastructure challenges.
Ph.D. program
Computer Science and Information Engineering
Bachelor
Computer Science and Information Engineering
This study demonstrates that fundamental NetFlow features—such as link quantity, TCP port usage, and connection duration—can significantly enhance OS type detection, achieving a 10% F1 score improvement and 29.86% faster training time using SHAP-selected attributes while challenging the reliability of traditionally favored features like TTL.
This study examines the feasibility of utilizing basic NetFlow attributes for OS type detection, showing that metrics such as link count, TCP port usage, and connection duration can enhance balanced accuracy by 8% compared to traditional methods while maintaining cost-effectiveness.
This research introduces a time-series-based feature design and multi-factor clustering approach to detect anomalous network nodes by leveraging temporal similarity and data correlation.
This study transforms packet flow data into time-series feature vectors and applies a multi-factor cumulative clustering algorithm to identify anomalous nodes based on temporal similarity and data correlation.
A paper detailing the development and impact of the packet synchronization method on NDN.