{"id":6,"date":"2019-12-05T04:55:29","date_gmt":"2019-12-04T20:55:29","guid":{"rendered":"http:\/\/47.94.221.113\/index.php\/projects-thuxukegroup\/"},"modified":"2025-10-22T13:42:49","modified_gmt":"2025-10-22T05:42:49","slug":"projects-thuxukegroup","status":"publish","type":"page","link":"http:\/\/thucsnet.com\/index.php\/projects-thuxukegroup\/","title":{"rendered":"Open Source"},"content":{"rendered":"<!doctype html>\r\n<html lang=\"zh-CN\">\r\n<head>\r\n  <meta charset=\"utf-8\" \/>\r\n  <meta name=\"viewport\" content=\"width=device-width, initial-scale=1\" \/>\r\n  <title>Open Source Projects | Lab<\/title>\r\n  <style>\r\n    :root{\r\n      \/* ===== \u9875\u9762\u5bb9\u5668\u5bbd\u5ea6\u4e0e\u5de6\u53f3\u8fb9\u8ddd\uff08\u6309\u9700\u6539\u6210\u4e0e thucsnet \u5934\u90e8\u4e00\u81f4\uff09 ===== *\/\r\n      --maxw: 1280px;   \/* \u4f8b\uff1a1140 \/ 1200 \/ 1280 *\/\r\n      --gutter: 40px;   \/* \u5de6\u53f3\u5b89\u5168\u8fb9\u8ddd\uff08\u4e0e\u5934\u90e8\u4e00\u81f4\uff09 *\/\r\n\r\n      \/* \u2014\u2014 \u4eae\u8272\u9875\u9762 + \u6df1\u8272\u5361\u7247 \u2014\u2014 *\/\r\n      --bg:#ffffff;              \/* \u9875\u9762\u80cc\u666f *\/\r\n      --paper:#ffffff;           \/* \u5206\u533a\u80cc\u666f *\/\r\n      --card:#141b2e;            \/* \u9879\u76ee\u5361\u7247\u6df1\u84dd *\/\r\n      --line:#27324a;            \/* \u6df1\u84dd\u63cf\u8fb9 *\/\r\n      --text:#1a1a1a;            \/* \u9875\u9762\u6587\u5b57\uff08\u6df1\uff09 *\/\r\n      --muted:#5f6b7a;           \/* \u9875\u9762\u6b21\u6587\u5b57 *\/\r\n      --brand:#6ea8fe;           \/* \u5f3a\u8c03\u8272\uff08\u94fe\u63a5\/hover\uff09 *\/\r\n      --text-on-card:#e9eef7;    \/* \u5361\u7247\u4e0a\u7684\u4e3b\u6587\u5b57 *\/\r\n      --muted-on-card:#b8c5e0;   \/* \u5361\u7247\u4e0a\u7684\u6b21\u6587\u5b57 *\/\r\n      --radius:14px;\r\n      --radius-sm:10px;\r\n      --shadow: 0 10px 28px rgba(0,0,0,.08);\r\n      --shadow-card: 0 10px 28px rgba(4,12,28,.28);\r\n    }\r\n    *{box-sizing:border-box}\r\n    body{\r\n      margin:0; background:var(--bg); color:var(--text);\r\n      font-family: ui-sans-serif,system-ui,-apple-system,Segoe UI,Roboto,\"Helvetica Neue\",Arial;\r\n      line-height:1.65;\r\n    }\r\n    a{color:var(--brand)}\r\n\r\n    \/* ===== \u5bb9\u5668\uff1a\u4e0d\u4f7f\u7528 vw \u6280\u5de7\uff1b\u8ddf\u968f\u7236\u5bb9\u5668\uff0c\u7f29\u653e\u7a33\u5b9a ===== *\/\r\n    .wrap{\r\n      width:100%;\r\n      max-width:none;\r\n      margin:0 auto;\r\n      padding:32px var(--gutter) 92px;\r\n    }\r\n    .os-bleed{\r\n  \/* \u8ba9\u5bb9\u5668\u653e\u5927\u5230 120% \u5e76\u6c34\u5e73\u5c45\u4e2d *\/\r\n  width: 140%;\r\n  max-width: 140%;\r\n  position: relative;\r\n  left: 50%;\r\n  transform: translateX(-50%);  \/* \u5173\u952e\uff1a\u628a\u5de6\u4fa7\u5bf9\u9f50\u70b9\u62c9\u56de\u5c45\u4e2d *\/\r\n\r\n  margin: 0;                     \/* \u907f\u514d margin \u5f71\u54cd\u5b9a\u4f4d *\/\r\n  \/* \u4e24\u4fa7\u5bf9\u79f0\u7559\u767d\u5373\u53ef\uff0c\u4e0d\u518d\u7528\u57fa\u4e8e 100% \u7684 calc *\/\r\n  padding-left: var(--gutter);\r\n  padding-right: var(--gutter);\r\n    }\r\n\r\n    \/* \u9876\u90e8 *\/\r\n    header{margin:6px 0 16px}\r\n    header h1{\r\n      margin:0 0 12px;\r\n      font-size: clamp(28px, 1.2rem + 1vw, 40px);\r\n      font-weight: 700;\r\n    }\r\n    header p{margin:0;color:var(--muted)}\r\n\r\n    \/* \u9876\u90e8\u5206\u7c7b\u5bfc\u822a\uff08\u7b49\u5bbd\u62c9\u901a\uff0c\u6df1\u8272\u6837\u5f0f\uff09 *\/\r\n    .nav{\r\n      position:sticky; top:0; z-index:5;\r\n      background:rgba(255,255,255,.92);\r\n      backdrop-filter: blur(4px);\r\n      border:1px solid #e6e9ef; border-radius:var(--radius);\r\n      box-shadow:var(--shadow); margin:18px 0; padding:12px;\r\n    }\r\n    .nav ul{\r\n      display:grid; \r\n      grid-template-columns:repeat(5,1fr); \/* \u2b50 \u4ece 5 \u6539\u4e3a 4 \u5217 *\/\r\n      gap:10px;\r\n      list-style:none; margin:0; padding:0;\r\n    }\r\n    .nav a{\r\n      display:block; text-align:center;\r\n      padding:12px 12px; border-radius:999px;\r\n      border:1px solid var(--line); text-decoration:none;\r\n      background:#0f1525; color:#e9eef7;\r\n      box-shadow: inset 0 0 0 1px rgba(255,255,255,.02);\r\n      font-weight:600; letter-spacing:.2px;\r\n      -webkit-font-smoothing: antialiased; text-rendering: optimizeLegibility;\r\n    }\r\n    .nav a:hover{border-color:#3a4f73;color:#ffffff}\r\n\r\n    \/* \u533a\u5757\uff08\u6bcf\u7c7b\u9879\u76ee\u533a\uff09 *\/\r\n    section.cat{\r\n      margin:32px 0 52px; padding:18px;\r\n      border:1px solid #e6e9ef; border-radius:var(--radius);\r\n      background:var(--paper);\r\n    }\r\n    .cat h2{margin:0 0 8px; font-size:24px}\r\n    .cat .desc{color:var(--muted); margin-bottom:16px}\r\n\r\n    \/* \u5206\u9694\u7ebf *\/\r\n    .divider{\r\n      height:1px;\r\n      background:linear-gradient(90deg, transparent, #e6e9ef, transparent);\r\n      margin:30px 0;\r\n    }\r\n\r\n    \/* \u2014\u2014 \u9879\u76ee\u5361\u7247\uff08\u4e09\u5c42\uff1a\u4e0a-\u4e2d-\u4e0b\uff1b\u6df1\u84dd\u914d\u8272\uff09 \u2014\u2014 *\/\r\n    .proj{\r\n      display:flex; flex-direction:column;\r\n      border:1px solid var(--line); border-radius:var(--radius);\r\n      background:var(--card); box-shadow:var(--shadow-card);\r\n      overflow:hidden; margin:18px 0;\r\n    }\r\n\r\n    \/* \u4e0a\u5c42\uff1a\u6807\u9898 + \u94fe\u63a5 *\/\r\n    .proj-head{\r\n      display:flex; align-items:center; gap:12px; justify-content:space-between;\r\n      padding:14px 18px; border-bottom:1px solid var(--line); background:var(--card);\r\n    }\r\n    .proj-title{font-weight:700; letter-spacing:.2px; color:var(--text-on-card)}\r\n    .links{display:flex; gap:10px; flex-wrap:wrap}\r\n    .btn{\r\n      display:inline-flex; align-items:center; gap:8px;\r\n      padding:8px 12px; border:1px solid var(--line); border-radius:10px;\r\n      background:#0f1525; color:var(--text-on-card); text-decoration:none;\r\n    }\r\n    .btn:hover{border-color:#3a4f73}\r\n    .btn svg{width:18px; height:18px}\r\n\r\n    \/* \u4e2d\u5c42\uff1a\u7b80\u4ecb\uff08\u6574\u884c\uff09 *\/\r\n    .proj-mid{\r\n      padding:16px 18px; border-bottom:1px solid var(--line); background:var(--card);\r\n    }\r\n    .proj-mid p{\r\n      margin:0; color:var(--text-on-card); font-size:15.5px; line-height:1.7; letter-spacing:.2px;\r\n    }\r\n\r\n    \/* \u4e0b\u5c42\uff1a\u56fe\u7247\uff08\u6574\u884c\uff09 *\/\r\n    .proj-img{  padding: 10px 18px 8px;\r\n  background: var(--card);\r\n}\r\n    .image-box{\r\n       border: none !important;\r\n  background: transparent !important;\r\n  min-height: 0 !important;\r\n  padding: 0 !important;\r\n    }\r\n\r\n.image_box, .image-box .placeholder{\r\n  padding: 0 !important;\r\n  margin: 0 !important;\r\n  border: 0 !important;\r\n  background: transparent !important;\r\n}\r\n\r\n    .image-box img{\r\n display: block;\r\n  width: 100%;\r\n  height: auto;\r\n  margin: 0;               \/* \u786e\u4fdd\u6ca1\u6709\u989d\u5916\u5916\u8fb9\u8ddd *\/\r\n  border-radius: 10px; \r\n}\r\n    .placeholder{color:var(--muted-on-card)}\r\n\r\n    html{scroll-behavior:smooth}\r\n\r\n\r\n\r\n  <\/style>\r\n<\/head>\r\n<body>\r\n  <div class=\"wrap os-bleed\">\r\n    <header>\r\n      <!-- \u53ef\u7559\u7a7a\u6216\u653e\u7f6e\u9875\u9762\u5bfc\u8bed -->\r\n    <\/header>\r\n\r\n    <!-- \u9876\u90e8\u5206\u7c7b\u5bfc\u822a\uff08\u951a\u70b9\uff0c\u6df1\u8272\u6309\u94ae\uff0c\u7b49\u5bbd\u62c9\u901a\uff09 -->\r\n    <nav class=\"nav\" aria-label=\"Categories\">\r\n      <ul>\r\n        <li><a href=\"#protocol-security\">\u534f\u8bae\u6808\u5b89\u5168<\/a><\/li>\r\n        <li><a href=\"#traffic-detection\">\u6d41\u91cf\u68c0\u6d4b<\/a><\/li>\r\n        <li><a href=\"#traffic-llm\">\u6d41\u91cf\u5927\u6a21\u578b<\/a><\/li>\r\n<li><a href=\"#dataplane\">\u667a\u80fd\u6570\u636e\u9762<\/a><\/li>\r\n        <li><a href=\"#course-materials\">\u8bfe\u7a0b\u6750\u6599<\/a><\/li>\r\n      <\/ul>\r\n    <\/nav>\r\n\r\n    <!-- 1. \u534f\u8bae\u5b89\u5168 -->\r\n    <section class=\"cat\" id=\"protocol-security\">\r\n      <h2>\u534f\u8bae\u6808\u5b89\u5168<\/h2>\r\n      <div class=\"desc\">\u5bf9\u534f\u8bae\u6808\u7684\u8ffd\u8e2a\u3001\u6027\u80fd\u4f18\u5316\u3001\u653b\u51fb\u68c0\u6d4b\u4e0e\u9632\u5fa1\u7b49\u3002<\/div>\r\n\r\n      <article class=\"proj\">\r\n        <div class=\"proj-head\">\r\n          <div class=\"proj-title\">Packetscope<\/div>\r\n          <div class=\"links\">\r\n            <a class=\"btn\" href=\"https:\/\/internet-architecture-and-security.github.io\/packetScope-website\/\" target=\"_blank\" rel=\"noopener noreferrer\" aria-label=\"Open project site\">\r\n  <!-- \u5730\u7403 icon -->\r\n  <svg viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" aria-hidden=\"true\">\r\n    <circle cx=\"12\" cy=\"12\" r=\"9\"\/>\r\n    <path d=\"M3 12h18M12 3a17 17 0 0 1 0 18M12 3a17 17 0 0 0 0 18\"\/>\r\n  <\/svg>\r\n  <span>Project<\/span>\r\n<\/a>\r\n\r\n            <a class=\"btn\" href=\"https:\/\/github.com\/Internet-Architecture-and-Security\/PacketScope\" target=\"_blank\" rel=\"noopener noreferrer\" aria-label=\"Open GitHub repo\">\r\n              <svg viewBox=\"0 0 24 24\" fill=\"currentColor\" aria-hidden=\"true\"><path d=\"M12 .5a12 12 0 0 0-3.79 23.4c.6.11.82-.26.82-.58v-2.02c-3.34.73-4.04-1.61-4.04-1.61-.55-1.4-1.34-1.77-1.34-1.77-1.1-.76.09-.74.09-.74 1.22.09 1.87 1.26 1.87 1.26 1.08 1.86 2.83 1.32 3.52 1.01.11-.78.42-1.32.76-1.62-2.66-.3-5.47-1.34-5.47-5.97 0-1.32.47-2.4 1.25-3.25-.13-.3-.54-1.52.12-3.17 0 0 1.01-.32 3.3 1.24a11.5 11.5 0 0 1 6 0c2.28-1.56 3.29-1.24 3.29-1.24.66 1.65.25 2.87.12 3.17.78.86 1.25 1.94 1.25 3.25 0 4.64-2.81 5.66-5.49 5.96.43.37.81 1.1.81 2.22v3.29c0 .32.22.7.82.58A12 12 0 0 0 12 .5Z\"\/><\/svg>\r\n              <span>GitHub<\/span>\r\n            <\/a>\r\n          <\/div>\r\n        <\/div>\r\n        <div class=\"proj-mid\">\r\n          <p>PacketScope is a general-purpose protocol stack analysis and debugging tool based on eBPF. It integrates performance optimization, anomaly diagnosis, and security defense. It aims to implement fine-grained tracing and intelligent analysis of network packets at the protocol stack level on the server side. By solving three major pain points\u2014difficult diagnosis of performance bottlenecks, unclear transmission paths, and hard-to-detect low-level attacks\u2014PacketScope provides visualized, intelligent endpoint-side security analysis and defense capabilities.<\/p>\r\n        <\/div>\r\n        <div class=\"proj-img\">\r\n          <div class=\"image-box\">\r\n            <!-- \u76f4\u63a5\u7c98\u8d34\u56fe\u7247\uff1a\u4f8b\u5982 <img decoding=\"async\" src=\"\/assets\/whisper.png\" alt=\"Whisper\"\/> -->\r\n            <div class=\"placeholder\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/packet-1024x554.png\" alt=\"\" width=\"604\" height=\"327\" class=\"alignnone size-large wp-image-680\" srcset=\"http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/packet-1024x554.png 1024w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/packet-300x162.png 300w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/packet-768x416.png 768w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/packet-1536x831.png 1536w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/packet-2048x1108.png 2048w\" sizes=\"(max-width: 604px) 100vw, 604px\" \/><\/div>\r\n          <\/div>\r\n        <\/div>\r\n      <\/article>\r\n    <\/section>\r\n\r\n    <div class=\"divider\" aria-hidden=\"true\"><\/div>\r\n\r\n    <!-- 2. \u6d41\u91cf\u68c0\u6d4b -->\r\n    <section class=\"cat\" id=\"traffic-detection\">\r\n      <h2>\u6d41\u91cf\u68c0\u6d4b<\/h2>\r\n      <div class=\"desc\">\u5bf9\u6076\u610f\u6d41\u91cf\u7684\u68c0\u6d4b\u3001\u884c\u4e3a\u5efa\u6a21\u3001\u53ef\u89c6\u5316\u4e0e\u8bc4\u6d4b\u7b49\u3002<\/div>\r\n\r\n      <article class=\"proj\">\r\n        <div class=\"proj-head\">\r\n          <div class=\"proj-title\">Whisper<\/div>\r\n          <div class=\"links\">\r\n            <a class=\"btn\" href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484585\" target=\"_blank\" rel=\"noopener noreferrer\">\r\n              <svg viewBox=\"0 0 24 24\" fill=\"none\" aria-hidden=\"true\"><path d=\"M7 3.5h7L19.5 9v11A1.5 1.5 0 0 1 18 21.5H7A1.5 1.5 0 0 1 5.5 20V5A1.5 1.5 0 0 1 7 3.5Z\" stroke=\"currentColor\" stroke-width=\"1.5\"\/><path d=\"M14 3.5V8a1 1 0 0 0 1 1h4.5\" stroke=\"currentColor\" stroke-width=\"1.5\"\/><\/svg>\r\n              <span>Paper<\/span>\r\n            <\/a>\r\n            <a class=\"btn\" href=\"https:\/\/github.com\/fuchuanpu\/Whisper\" target=\"_blank\" rel=\"noopener noreferrer\">\r\n              <svg viewBox=\"0 0 24 24\" fill=\"currentColor\" aria-hidden=\"true\"><path d=\"M12 .5a12 12 0 0 0-3.79 23.4c.6.11.82-.26.82-.58v-2.02c-3.34.73-4.04-1.61-4.04-1.61-.55-1.4-1.34-1.77-1.34-1.77-1.1-.76.09-.74.09-.74 1.22.09 1.87 1.26 1.87 1.26 1.08 1.86 2.83 1.32 3.52 1.01.11-.78.42-1.32.76-1.62-2.66-.3-5.47-1.34-5.47-5.97 0-1.32 .47-2.4 1.25-3.25-.13-.3-.54-1.52 .12-3.17 0 0 1.01-.32 3.3 1.24a11.5 11.5 0 0 1 6 0c2.28-1.56 3.29-1.24 3.29-1.24 .66 1.65 .25 2.87 .12 3.17 .78 .86 1.25 1.94 1.25 3.25 0 4.64-2.81 5.66-5.49 5.96 .43 .37 .81 1.1 .81 2.22v3.29c0 .32 .22 .7 .82 .58A12 12 0 0 0 12 .5Z\"\/><\/svg>\r\n              <span>GitHub<\/span>\r\n            <\/a>\r\n          <\/div>\r\n        <\/div>\r\n        <div class=\"proj-mid\">\r\n          <p>Whisper is a real-time malicious traffic detection system based on machine learning. It leverages frequency-domain features to represent sequential traffic information with bounded information loss, ensuring both high detection accuracy and high throughput. By constraining the feature scale, Whisper achieves efficient real-time detection even in high-throughput networks. Compared with traditional rule-based and existing ML-based systems, it is more robust against sophisticated and stealthy evasion attacks. Extensive experiments on 42 attack types demonstrate that Whisper improves AUC by up to 18.36% and achieves two orders of magnitude higher throughput, while maintaining around 90% detection accuracy under various evasion scenarios.<\/p>\r\n        <\/div>\r\n        <div class=\"proj-img\"><div class=\"image-box\"><div class=\"placeholder\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/whisper.png\" alt=\"\" width=\"978\" height=\"315\" class=\"alignnone size-full wp-image-684\" srcset=\"http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/whisper.png 978w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/whisper-300x97.png 300w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/whisper-768x247.png 768w\" sizes=\"(max-width: 978px) 100vw, 978px\" \/><\/div><\/div><\/div>\r\n      <\/article>\r\n\r\n      <article class=\"proj\">\r\n        <div class=\"proj-head\">\r\n          <div class=\"proj-title\">NetBeacon<\/div>\r\n          <div class=\"links\">\r\n            <a class=\"btn\" href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/zhou-guangmeng\" target=\"_blank\" rel=\"noopener noreferrer\">\r\n              <svg viewBox=\"0 0 24 24\" fill=\"none\" aria-hidden=\"true\"><path d=\"M7 3.5h7L19.5 9v11A1.5 1.5 0 0 1 18 21.5H7A1.5 1.5 0 0 1 5.5 20V5A1.5 1.5 0 0 1 7 3.5Z\" stroke=\"currentColor\" stroke-width=\"1.5\"\/><path d=\"M14 3.5V8a1 1 0 0 0 1 1h4.5\" stroke=\"currentColor\" stroke-width=\"1.5\"\/><\/svg>\r\n              <span>Paper<\/span>\r\n            <\/a>\r\n            <a class=\"btn\" href=\"https:\/\/github.com\/IDP-code\/NetBeacon\" target=\"_blank\" rel=\"noopener noreferrer\">\r\n              <svg viewBox=\"0 0 24 24\" fill=\"currentColor\" aria-hidden=\"true\"><path d=\"M12 .5a12 12 0 0 0-3.79 23.4c.6.11.82-.26.82-.58v-2.02c-3.34.73-4.04-1.61-4.04-1.61-.55-1.4-1.34-1.77-1.34-1.77-1.1-.76.09-.74 .09-.74 1.22 .09 1.87 1.26 1.87 1.26 1.08 1.86 2.83 1.32 3.52 1.01 .11-.78 .42-1.32 .76-1.62-2.66-.3-5.47-1.34-5.47-5.97 0-1.32 .47-2.4 1.25-3.25-.13-.3-.54-1.52 .12-3.17 0 0 1.01-.32 3.3 1.24a11.5 11.5 0 0 1 6 0c2.28-1.56 3.29-1.24 3.29-1.24 .66 1.65 .25 2.87 .12 3.17 .78 .86 1.25 1.94 1.25 3.25 0 4.64-2.81 5.66-5.49 5.96 .43 .37 .81 1.1 .81 2.22v3.29c0 .32 .22 .7 .82 .58A12 12 0 0 0 12 .5Z\"\/><\/svg>\r\n              <span>GitHub<\/span>\r\n            <\/a>\r\n          <\/div>\r\n        <\/div>\r\n        <div class=\"proj-mid\"><p>NetBeacon is an intelligent data plane system that integrates machine learning models directly into the network data plane for real-time traffic analysis. It introduces a multi-phase sequential architecture to dynamically analyze packets across different flow stages, leveraging flow-level features computable at line speed to significantly improve accuracy. To ensure efficient deployment, NetBeacon designs compact model representations to mitigate table entry explosion and introduces tightly coupled mechanisms to manage stateful storage for concurrent flows. Extensive evaluations demonstrate that NetBeacon advances both accuracy and scalability for a wide range of traffic analysis tasks.<\/p><\/div>\r\n        <div class=\"proj-img\"><div class=\"image-box\"><div class=\"placeholder\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/beacon.png\" alt=\"\" width=\"1020\" height=\"360\" class=\"alignnone size-full wp-image-687\" srcset=\"http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/beacon.png 1020w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/beacon-300x106.png 300w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/beacon-768x271.png 768w\" sizes=\"(max-width: 1020px) 100vw, 1020px\" \/><\/div><\/div><\/div>\r\n      <\/article>\r\n\r\n      <article class=\"proj\">\r\n        <div class=\"proj-head\">\r\n          <div class=\"proj-title\">HyperVision<\/div>\r\n          <div class=\"links\">\r\n            <a class=\"btn\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/detecting-unknown-encrypted-malicious-traffic-in-real-time-via-flow-interaction-graph-analysis\/\" target=\"_blank\" rel=\"noopener noreferrer\">\r\n              <svg viewBox=\"0 0 24 24\" fill=\"none\" aria-hidden=\"true\"><path d=\"M7 3.5h7L19.5 9v11A1.5 1.5 0 0 1 18 21.5H7A1.5 1.5 0 0 1 5.5 20V5A1.5 1.5 0 0 1 7 3.5Z\" stroke=\"currentColor\" stroke-width=\"1.5\"\/><path d=\"M14 3.5V8a1 1 0 0 0 1 1h4.5\" stroke=\"currentColor\" stroke-width=\"1.5\"\/><\/svg>\r\n              <span>Paper<\/span>\r\n            <\/a>\r\n            <a class=\"btn\" href=\"https:\/\/github.com\/fuchuanpu\/HyperVision\" target=\"_blank\" rel=\"noopener noreferrer\">\r\n              <svg viewBox=\"0 0 24 24\" fill=\"currentColor\" aria-hidden=\"true\"><path d=\"M12 .5a12 12 0 0 0-3.79 23.4c.6.11.82-.26 .82-.58v-2.02c-3.34 .73-4.04-1.61-4.04-1.61-.55-1.4-1.34-1.77-1.34-1.77-1.1-.76 .09-.74 .09-.74 1.22 .09 1.87 1.26 1.87 1.26 1.08 1.86 2.83 1.32 3.52 1.01 .11-.78 .42-1.32 .76-1.62-2.66-.3-5.47-1.34-5.47-5.97 0-1.32 .47-2.4 1.25-3.25-.13-.3-.54-1.52 .12-3.17 0 0 1.01-.32 3.3 1.24a11.5 11.5 0 0 1 6 0c2.28-1.56 3.29-1.24 3.29-1.24 .66 1.65 .25 2.87 .12 3.17 .78 .86 1.25 1.94 1.25 3.25 0 4.64-2.81 5.66-5.49 5.96 .43 .37 .81 1.1 .81 2.22v3.29c0 .32 .22 .7 .82 .58A12 12 0 0 0 12 .5Z\"\/><\/svg>\r\n              <span>GitHub<\/span>\r\n            <\/a>\r\n          <\/div>\r\n        <\/div>\r\n        <div class=\"proj-mid\"><p>HyperVision is a real-time unsupervised machine learning system for detecting unknown encrypted malicious traffic. Instead of relying on labeled datasets of known attacks, it builds a compact in-memory flow interaction graph that captures structural traffic patterns. By applying unsupervised graph learning on connectivity, sparsity, and statistical features, HyperVision can uncover abnormal interaction patterns that correspond to encrypted attacks. The system achieves high detection robustness against evasive behaviors, reaching AUC \u2265 0.92 and F1 \u2265 0.86 on 92 real-world datasets, while maintaining throughput of at least 80.6 Gb\/s with sub-second latency.<\/p><\/div>\r\n        <div class=\"proj-img\"><div class=\"image-box\"><div class=\"placeholder\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/hyper-1024x431.png\" alt=\"\" width=\"604\" height=\"254\" class=\"alignnone size-large wp-image-692\" srcset=\"http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/hyper-1024x431.png 1024w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/hyper-300x126.png 300w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/hyper-768x323.png 768w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/hyper-1536x646.png 1536w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/hyper.png 1754w\" sizes=\"(max-width: 604px) 100vw, 604px\" \/><\/div><\/div><\/div>\r\n      <\/article>\r\n\r\n      <article class=\"proj\">\r\n        <div class=\"proj-head\">\r\n          <div class=\"proj-title\">NetMasquerade<\/div>\r\n          <div class=\"links\">\r\n<a class=\"btn\" href=\"http:\/\/arxiv.org\/abs\/2510.14906\" target=\"_blank\" rel=\"noopener noreferrer\">\r\n              <svg viewBox=\"0 0 24 24\" fill=\"none\" aria-hidden=\"true\"><path d=\"M7 3.5h7L19.5 9v11A1.5 1.5 0 0 1 18 21.5H7A1.5 1.5 0 0 1 5.5 20V5A1.5 1.5 0 0 1 7 3.5Z\" stroke=\"currentColor\" stroke-width=\"1.5\"\/><path d=\"M14 3.5V8a1 1 0 0 0 1 1h4.5\" stroke=\"currentColor\" stroke-width=\"1.5\"\/><\/svg>\r\n              <span>Paper<\/span>\r\n            <\/a>\r\n            <a class=\"btn\" href=\"https:\/\/github.com\/09nat\/NetMasquerade\" target=\"_blank\" rel=\"noopener noreferrer\">\r\n              <svg viewBox=\"0 0 24 24\" fill=\"currentColor\" aria-hidden=\"true\"><path d=\"M12 .5a12 12 0 0 0-3.79 23.4c.6.11.82-.26 .82-.58v-2.02c-3.34 .73-4.04-1.61-4.04-1.61-.55-1.4-1.34-1.77-1.34-1.77-1.1-.76 .09-.74 .09-.74 1.22 .09 1.87 1.26 1.87 1.26 1.08 1.86 2.83 1.32 3.52 1.01 .11-.78 .42-1.32 .76-1.62-2.66-.3-5.47-1.34-5.47-5.97 0-1.32 .47-2.4 1.25-3.25-.13-.3-.54-1.52 .12-3.17 0 0 1.01-.32 3.3 1.24a11.5 11.5 0 0 1 6 0c2.28-1.56 3.29-1.24 3.29-1.24 .66 1.65 .25 2.87 .12 3.17 .78 .86 1.25 1.94 1.25 3.25 0 4.64-2.81 5.66-5.49 5.96 .43 .37 .81 1.1 .81 2.22v3.29c0 .32 .22 .7 .82 .58A12 12 0 0 0 12 .5Z\"\/><\/svg>\r\n              <span>GitHub<\/span>\r\n            <\/a>\r\n          <\/div>\r\n        <\/div>\r\n        <div class=\"proj-mid\"><p>NetMasquerade is a hard-label black-box adversarial attack designed to evaluate the robustness of ML-based malicious traffic detection systems. It is built upon a two-stage framework that first captures benign traffic patterns and then uses them to guide the generation of adversarial traffic. The first stage uses a tailored pre-trained model, \r\nTraffic-BERT, to learn diverse benign traffic distributions. The second stage then employs an RL framework to embed these benign traffic patterns into malicious flows with minimal modifications. This method ensures the attack&#8217;s efficiency and effectiveness, successfully evading detection while preserving the original malicious functionality.<\/p><\/div>\r\n        <div class=\"proj-img\"><div class=\"image-box\"><div class=\"placeholder\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/net-1024x520.png\" alt=\"\" width=\"604\" height=\"307\" class=\"alignnone size-large wp-image-622\" srcset=\"http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/net-1024x520.png 1024w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/net-300x152.png 300w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/net-768x390.png 768w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/net.png 1034w\" sizes=\"(max-width: 604px) 100vw, 604px\" \/><\/div><\/div><\/div>\r\n      <\/article>\r\n    <\/section>\r\n\r\n    <div class=\"divider\" aria-hidden=\"true\"><\/div>\r\n\r\n    <!-- 3. \u6d41\u91cf\u5927\u6a21\u578b -->\r\n    <section class=\"cat\" id=\"traffic-llm\">\r\n      <h2>\u6d41\u91cf\u5927\u6a21\u578b<\/h2>\r\n      <div class=\"desc\">\u5229\u7528\/\u6269\u5c55 LLM \u80fd\u529b\u7528\u4e8e\u7f51\u7edc\u6d41\u91cf\u7406\u89e3\u3001\u751f\u6210\u4e0e\u8bc4\u6d4b\u3002<\/div>\r\n\r\n      <article class=\"proj\">\r\n        <div class=\"proj-head\">\r\n          <div class=\"proj-title\">TrafficLLM<\/div>\r\n          <div class=\"links\">\r\n<a class=\"btn\" href=\"https:\/\/arxiv.org\/abs\/2504.04222\" target=\"_blank\" rel=\"noopener noreferrer\">\r\n              <svg viewBox=\"0 0 24 24\" fill=\"none\" aria-hidden=\"true\"><path d=\"M7 3.5h7L19.5 9v11A1.5 1.5 0 0 1 18 21.5H7A1.5 1.5 0 0 1 5.5 20V5A1.5 1.5 0 0 1 7 3.5Z\" stroke=\"currentColor\" stroke-width=\"1.5\"\/><path d=\"M14 3.5V8a1 1 0 0 0 1 1h4.5\" stroke=\"currentColor\" stroke-width=\"1.5\"\/><\/svg>\r\n              <span>Paper<\/span>\r\n            <\/a>\r\n            <a class=\"btn\" href=\"https:\/\/github.com\/ZGC-LLM-Safety\/TrafficLLM\" target=\"_blank\" rel=\"noopener noreferrer\">\r\n              <svg viewBox=\"0 0 24 24\" fill=\"currentColor\" aria-hidden=\"true\"><path d=\"M12 .5a12 12 0 0 0-3.79 23.4c.6.11.82-.26.82-.58v-2.02c-3.34.73-4.04-1.61-4.04-1.61-.55-1.4-1.34-1.77-1.34-1.77-1.1-.76.09-.74.09-.74 1.22.09 1.87 1.26 1.87 1.26 1.08 1.86 2.83 1.32 3.52 1.01 .11-.78 .42-1.32 .76-1.62-2.66-.3-5.47-1.34-5.47-5.97 0-1.32 .47-2.4 1.25-3.25-.13-.3-.54-1.52 .12-3.17 0 0 1.01-.32 3.3 1.24a11.5 11.5 0 0 1 6 0c2.28-1.56 3.29-1.24 3.29-1.24 .66 1.65 .25 2.87 .12 3.17 .78 .86 1.25 1.94 1.25 3.25 0 4.64-2.81 5.66-5.49 5.96 .43 .37 .81 1.1 .81 2.22v3.29c0 .32 .22 .7 .82 .58A12 12 0 0 0 12 .5Z\"\/><\/svg>\r\n              <span>GitHub<\/span>\r\n            <\/a>\r\n          <\/div>\r\n        <\/div>\r\n        <div class=\"proj-mid\"><p>The repository of TrafficLLM is a universal LLM adaptation framework to learn robust traffic representation for all open-sourced LLM in real-world scenarios and enhance the generalization across diverse traffic analysis tasks. TrafficLLM is built upon a sophisticated fine-tuning framework using natural language and traffic data, which proposes the techniques including traffic-domain tokenization, dual-stage tuning pipeline, and extensible adaptation with parameter-effective fine-tuning, to enhance the utility of large language models in network traffic analysis.<\/p><\/div>\r\n        <div class=\"proj-img\"><div class=\"image-box\"><div class=\"placeholder\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/trafficLLM-1024x335.png\" alt=\"\" width=\"580\" height=\"198\" class=\"alignnone size-large wp-image-613\" \/><\/div><\/div><\/div>\r\n      <\/article>\r\n\r\n      <article class=\"proj\">\r\n        <div class=\"proj-head\">\r\n          <div class=\"proj-title\">TrafficFormer<\/div>\r\n          <div class=\"links\">\r\n<a class=\"btn\" href=\"http:\/\/www.thucsnet.com\/wp-content\/papers\/guangmeng_sp2025.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\r\n              <svg viewBox=\"0 0 24 24\" fill=\"none\" aria-hidden=\"true\"><path d=\"M7 3.5h7L19.5 9v11A1.5 1.5 0 0 1 18 21.5H7A1.5 1.5 0 0 1 5.5 20V5A1.5 1.5 0 0 1 7 3.5Z\" stroke=\"currentColor\" stroke-width=\"1.5\"\/><path d=\"M14 3.5V8a1 1 0 0 0 1 1h4.5\" stroke=\"currentColor\" stroke-width=\"1.5\"\/><\/svg>\r\n              <span>Paper<\/span>\r\n            <\/a>\r\n            <a class=\"btn\" href=\"https:\/\/github.com\/IDP-code\/TrafficFormer\" target=\"_blank\" rel=\"noopener noreferrer\">\r\n              <svg viewBox=\"0 0 24 24\" fill=\"currentColor\" aria-hidden=\"true\"><path d=\"M12 .5a12 12 0 0 0-3.79 23.4c.6.11.82-.26.82-.58v-2.02c-3.34.73-4.04-1.61-4.04-1.61-.55-1.4-1.34-1.77-1.34-1.77-1.1-.76 .09-.74 .09-.74 1.22 .09 1.87 1.26 1.87 1.26 1.08 1.86 2.83 1.32 3.52 1.01 .11-.78 .42-1.32 .76-1.62-2.66-.3-5.47-1.34-5.47-5.97 0-1.32 .47-2.4 1.25-3.25-.13-.3-.54-1.52 .12-3.17 0 0 1.01-.32 3.3 1.24a11.5 11.5 0 0 1 6 0c2.28-1.56 3.29-1.24 3.29-1.24 .66 1.65 .25 2.87 .12 3.17 .78 .86 1.25 1.94 1.25 3.25 0 4.64-2.81 5.66-5.49 5.96 .43 .37 .81 1.1 .81 2.22v3.29c0 .32 .22 .7 .82 .58A12 12 0 0 0 12 .5Z\"\/><\/svg>\r\n              <span>GitHub<\/span>\r\n            <\/a>\r\n          <\/div>\r\n        <\/div>\r\n        <div class=\"proj-mid\"><p>TrafficFormer is a pre-training model designed for network traffic data to address the challenge of limited labeled datasets. In the pre-training stage, it introduces a fine-grained multi-classification task to enhance traffic representation, while in the fine-tuning stage it proposes a traffic data augmentation method that leverages random field initialization to help models focus on key information. Extensive evaluations on traffic classification and protocol understanding tasks show that TrafficFormer improves F1 scores by up to 10% across six datasets and significantly outperforms existing pre-training approaches in protocol understanding.<\/p><\/div>\r\n        <div class=\"proj-img\"><div class=\"image-box\"><div class=\"placeholder\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/former-1024x369.png\" alt=\"\" width=\"604\" height=\"218\" class=\"alignnone size-large wp-image-689\" srcset=\"http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/former-1024x369.png 1024w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/former-300x108.png 300w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/former-768x277.png 768w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/former.png 1056w\" sizes=\"(max-width: 604px) 100vw, 604px\" \/><\/div><\/div><\/div>\r\n      <\/article>\r\n    <\/section>\r\n\r\n    <div class=\"divider\" aria-hidden=\"true\"><\/div>\r\n\r\n\r\n<!-- 4. \u667a\u80fd\u6570\u636e\u9762 -->\r\n    <section class=\"cat\" id=\"dataplane\">\r\n      <h2>\u667a\u80fd\u6570\u636e\u9762<\/h2>\r\n      <div class=\"desc\">\u5728\u53ef\u7f16\u7a0b\u4ea4\u6362\u673a\/\u6570\u636e\u5e73\u9762\u4e0a\u6267\u884c\u4f4e\u5ef6\u8fdf\u3001\u9ad8\u541e\u5410\u7684\u5728\u7ebf\u5206\u6790\u4efb\u52a1\u3002<\/div>\r\n\r\n      <article class=\"proj\">\r\n        <div class=\"proj-head\">\r\n          <div class=\"proj-title\">FENIX<\/div>\r\n          <div class=\"links\">\r\n<a class=\"btn\" href=\"https:\/\/arxiv.org\/abs\/2507.14891\" target=\"_blank\" rel=\"noopener noreferrer\">\r\n              <svg viewBox=\"0 0 24 24\" fill=\"none\" aria-hidden=\"true\"><path d=\"M7 3.5h7L19.5 9v11A1.5 1.5 0 0 1 18 21.5H7A1.5 1.5 0 0 1 5.5 20V5A1.5 1.5 0 0 1 7 3.5Z\" stroke=\"currentColor\" stroke-width=\"1.5\"\/><path d=\"M14 3.5V8a1 1 0 0 0 1 1h4.5\" stroke=\"currentColor\" stroke-width=\"1.5\"\/><\/svg>\r\n              <span>Paper<\/span>\r\n            <\/a>\r\n            <a class=\"btn\" href=\"http:\/\/github.com\/IntelliSwitch\/FENIX\" target=\"_blank\" rel=\"noopener noreferrer\">\r\n              <svg viewBox=\"0 0 24 24\" fill=\"currentColor\" aria-hidden=\"true\"><path d=\"M12 .5a12 12 0 0 0-3.79 23.4c.6.11.82-.26.82-.58v-2.02c-3.34.73-4.04-1.61-4.04-1.61-.55-1.4-1.34-1.77-1.34-1.77-1.1-.76.09-.74.09-.74 1.22.09 1.87 1.26 1.87 1.26 1.08 1.86 2.83 1.32 3.52 1.01 .11-.78 .42-1.32 .76-1.62-2.66-.3-5.47-1.34-5.47-5.97 0-1.32 .47-2.4 1.25-3.25-.13-.3-.54-1.52 .12-3.17 0 0 1.01-.32 3.3 1.24a11.5 11.5 0 0 1 6 0c2.28-1.56 3.29-1.24 3.29-1.24 .66 1.65 .25 2.87 .12 3.17 .78 .86 1.25 1.94 1.25 3.25 0 4.64-2.81 5.66-5.49 5.96 .43 .37 .81 1.1 .81 2.22v3.29c0 .32 .22 .7 .82 .58A12 12 0 0 0 12 .5Z\"\/><\/svg>\r\n              <span>GitHub<\/span>\r\n            <\/a>\r\n          <\/div>\r\n        <\/div>\r\n        <div class=\"proj-mid\"><p>FENIX is a hybrid in-network DNN inference system designed to enable high-accuracy, low-latency traffic analysis on programmable network switches. It is built upon a two-stage architecture that first extracts traffic features on programmable switch ASICs and then performs deep neural network inference on FPGAs. The first stage employs a Data Engine to efficiently extract and cache packet-level features from multi-terabit traffic streams using Flow Tracker, Rate Limiter, and Buffer Manager modules. The second stage then utilizes a Model Engine to execute complex neural networks directly in the data plane with microsecond-level latency. This method ensures the system&#8217;s scalability and practicality, successfully achieving high classification accuracy on encrypted traffic and malware detection while maintaining multi-terabit throughput.<\/p><\/div>\r\n        <div class=\"proj-img\"><div class=\"image-box\"><div class=\"placeholder\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/10\/fenix-1024x657.jpg\" alt=\"\" width=\"604\" height=\"388\" class=\"alignnone size-large wp-image-720\" srcset=\"http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/10\/fenix-1024x657.jpg 1024w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/10\/fenix-300x192.jpg 300w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/10\/fenix-768x492.jpg 768w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/10\/fenix.jpg 1307w\" sizes=\"(max-width: 604px) 100vw, 604px\" \/><\/div><\/div><\/div>\r\n      <\/article>\r\n\r\n      <article class=\"proj\">\r\n        <div class=\"proj-head\">\r\n          <div class=\"proj-title\">Pegasus<\/div>\r\n          <div class=\"links\">\r\n<a class=\"btn\" href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3718958.3750529\" target=\"_blank\" rel=\"noopener noreferrer\">\r\n              <svg viewBox=\"0 0 24 24\" fill=\"none\" aria-hidden=\"true\"><path d=\"M7 3.5h7L19.5 9v11A1.5 1.5 0 0 1 18 21.5H7A1.5 1.5 0 0 1 5.5 20V5A1.5 1.5 0 0 1 7 3.5Z\" stroke=\"currentColor\" stroke-width=\"1.5\"\/><path d=\"M14 3.5V8a1 1 0 0 0 1 1h4.5\" stroke=\"currentColor\" stroke-width=\"1.5\"\/><\/svg>\r\n              <span>Paper<\/span>\r\n            <\/a>\r\n            <a class=\"btn\" href=\"https:\/\/github.com\/afireswallow\/Pegasus\" target=\"_blank\" rel=\"noopener noreferrer\">\r\n              <svg viewBox=\"0 0 24 24\" fill=\"currentColor\" aria-hidden=\"true\"><path d=\"M12 .5a12 12 0 0 0-3.79 23.4c.6.11.82-.26.82-.58v-2.02c-3.34.73-4.04-1.61-4.04-1.61-.55-1.4-1.34-1.77-1.34-1.77-1.1-.76 .09-.74 .09-.74 1.22 .09 1.87 1.26 1.87 1.26 1.08 1.86 2.83 1.32 3.52 1.01 .11-.78 .42-1.32 .76-1.62-2.66-.3-5.47-1.34-5.47-5.97 0-1.32 .47-2.4 1.25-3.25-.13-.3-.54-1.52 .12-3.17 0 0 1.01-.32 3.3 1.24a11.5 11.5 0 0 1 6 0c2.28-1.56 3.29-1.24 3.29-1.24 .66 1.65 .25 2.87 .12 3.17 .78 .86 1.25 1.94 1.25 3.25 0 4.64-2.81 5.66-5.49 5.96 .43 .37 .81 1.1 .81 2.22v3.29c0 .32 .22 .7 .82 .58A12 12 0 0 0 12 .5Z\"\/><\/svg>\r\n              <span>GitHub<\/span>\r\n            <\/a>\r\n          <\/div>\r\n        <\/div>\r\n        <div class=\"proj-mid\"><p>Pegasus is a universal DNN-inference framework for programmable data planes that compiles models into three primitives\u2014Partition. Map and SumReduce\u2014to run on P4 switches.\r\nIt uses fuzzy-matching indices and primitive fusion to shrink tables and pipeline cost, and combines full-precision weights with fixed-point activations and a safe aggregation layout. The result is consistent software\u2013hardware outputs, support for multiple model families (MLP\/RNN\/CNN\/AE), and line-rate, nanosecond-scale execution on constrained dataplanes.<\/p><\/div>\r\n        <div class=\"proj-img\"><div class=\"image-box\"><div class=\"placeholder\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/10\/pegasus.png\" alt=\"\" width=\"818\" height=\"970\" class=\"alignnone size-full wp-image-722\" srcset=\"http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/10\/pegasus.png 818w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/10\/pegasus-253x300.png 253w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/10\/pegasus-768x911.png 768w\" sizes=\"(max-width: 818px) 100vw, 818px\" \/><\/div><\/div><\/div>\r\n      <\/article>\r\n    <\/section>\r\n\r\n    <div class=\"divider\" aria-hidden=\"true\"><\/div>\r\n\r\n    <!-- 5. \u8bfe\u7a0b\u914d\u5957\u6750\u6599 -->\r\n    <section class=\"cat\" id=\"course-materials\">\r\n      <h2>\u8bfe\u7a0b\u6750\u6599<\/h2>\r\n      <div class=\"desc\">\u8bfe\u7a0b\u76f8\u5173\u5f00\u6e90\u8d44\u6599\u3001\u5b9e\u9a8c\u3002<\/div>\r\n\r\n      <article class=\"proj\">\r\n        <div class=\"proj-head\">\r\n          <div class=\"proj-title\">Cybersecurity-Fundamentals (\u300a\u7f51\u7edc\u7a7a\u95f4\u5b89\u5168\u5bfc\u8bba\u300b\u8bfe\u7a0b\u914d\u5957\u8d44\u6e90)<\/div>\r\n          <div class=\"links\">\r\n            <a class=\"btn\" href=\"https:\/\/github.com\/Cybersecurity-THU\/Cybersecurity-Fundamentals\" target=\"_blank\" rel=\"noopener noreferrer\">\r\n              <svg viewBox=\"0 0 24 24\" fill=\"currentColor\" aria-hidden=\"true\"><path d=\"M12 .5a12 12 0 0 0-3.79 23.4c.6.11.82-.26 .82-.58v-2.02c-3.34 .73-4.04-1.61-4.04-1.61-.55-1.4-1.34-1.77-1.34-1.77-1.1-.76 .09-.74 .09-.74 1.22 .09 1.87 1.26 1.87 1.26 1.08 1.86 2.83 1.32 3.52 1.01 .11-.78 .42-1.32 .76-1.62-2.66-.3-5.47-1.34-5.47-5.97 0-1.32 .47-2.4 1.25-3.25-.13-.3-.54-1.52 .12-3.17 0 0 1.01-.32 3.3 1.24a11.5 11.5 0 0 1 6 0c2.28-1.56 3.29-1.24 3.29-1.24 .66 1.65 .25 2.87 .12 3.17 .78 .86 1.25 1.94 1.25 3.25 0 4.64-2.81 5.66-5.49 5.96 .43 .37 .81 1.1 .81 2.22v3.29c0 .32 .22 .7 .82 .58A12 12 0 0 0 12 .5Z\"\/><\/svg>\r\n              <span>GitHub<\/span>\r\n            <\/a>\r\n          <\/div>\r\n        <\/div>\r\n        <div class=\"proj-mid\"><p>This course focuses on the disciplinary framework of cyberspace security, with an emphasis on introducing the fundamental theories, issues, and mechanisms related to the field. It aims to familiarize students with the overall structure of cyberspace security, provide them with a systematic understanding of its foundational knowledge, raise awareness of potential security risks, and strengthen their security consciousness. The course covers a range of topics, including basic theories, mechanisms, and algorithms of cyberspace security, applied cryptography, system security, network security, application security, and data security. In addition, typical security incidents and case studies are incorporated to inspire critical thinking, enabling students to acquire preliminary skills in analyzing and preventing security problems. Representative laboratory experiments are also designed to deepen students\u2019 understanding of cyberspace security issues.<\/p><\/div>\r\n        <div class=\"proj-img\"><div class=\"image-box\"><div class=\"placeholder\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/architecture-1024x501.png\" alt=\"\" width=\"604\" height=\"296\" class=\"alignnone size-large wp-image-697\" srcset=\"http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/architecture-1024x501.png 1024w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/architecture-300x147.png 300w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/architecture-768x376.png 768w, http:\/\/47.94.221.113\/wp-content\/uploads\/2025\/09\/architecture.png 1232w\" sizes=\"(max-width: 604px) 100vw, 604px\" \/><\/div><\/div><\/div>\r\n      <\/article>\r\n    <\/section>\r\n\r\n  <\/div>\r\n<\/body>\r\n<\/html>\r\n","protected":false},"excerpt":{"rendered":"Open Source Projects | Lab \u534f\u8bae\u6808\u5b89\u5168 \u6d41\u91cf\u68c0\u6d4b \u6d41\u91cf\u5927\u6a21\u578b \u667a\u80fd\u6570\u636e\u9762 \u8bfe\u7a0b\u6750\u6599  [&hellip;]","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/pages\/6"}],"collection":[{"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/comments?post=6"}],"version-history":[{"count":112,"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/pages\/6\/revisions"}],"predecessor-version":[{"id":723,"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/pages\/6\/revisions\/723"}],"wp:attachment":[{"href":"http:\/\/thucsnet.com\/index.php\/wp-json\/wp\/v2\/media?parent=6"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}