Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MAF-SAM: An effective method to perceive data plane threats of inter domain routing system., , , and . Comput. Networks, (2016)TL;DR Hazard: A Comprehensive Study of Levelsquatting Scams., , , , , , , , , and 3 other author(s). SecureComm (2), volume 305 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 3-25. Springer, (2019)WindTalker: A P2P-Based Low-Latency Anonymous Communication Network., , , and . IEICE Trans. Commun., 92-B (10): 3183-3194 (2009)Anonymity analysis of P2P anonymous communication systems., , , and . Comput. Commun., 34 (3): 358-366 (2011)TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis., , , , , , , , , and 3 other author(s). EuroS&P, page 560-575. IEEE, (2019)What You See Isn't Always What You Get: A Measurement Study of Usage Fraud on Android Apps., , , and . SPSM@CCS, page 23-32. ACM, (2016)Algorithms for Congestion Detection and Control., , , , and . GCC Workshops, volume 3252 of Lecture Notes in Computer Science, page 374-381. Springer, (2004)IABA: An improved PNN Algorithm for anomaly detection in network security management., , , and . ICNC, page 335-339. IEEE, (2010)ValCAT: Variable-Length Contextualized Adversarial Transformations Using Encoder-Decoder Language Model., , , , , and . NAACL-HLT, page 1735-1746. Association for Computational Linguistics, (2022)Measuring Privacy Threats in China-Wide Mobile Networks., , , , , and . FOCI @ USENIX Security Symposium, USENIX Association, (2018)