Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MUCM: Multilevel User Cluster Mining Based on Behavior Profiles for Network Monitoring., , , and . IEEE Syst. J., 9 (4): 1322-1333 (2015)A Two-Stagse Approach for Social Identity Linkage Based on an Enhanced Weighted Graph Model., , , and . Mob. Networks Appl., 25 (4): 1364-1375 (2020)Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection., , and . IEEE Trans. Inf. Forensics Secur., (2022)Progress in studies on automated generalization of spatial point cluster., , and . IGARSS, page 2841-2844. IEEE, (2004)High-quality tweet generation for online behavior security management based on semantics measurement., , , , and . Trans. Emerg. Telecommun. Technol., (2022)Symmetry Degree Measurement and its Applications to Anomaly Detection., , , , , and . IEEE Trans. Inf. Forensics Secur., (2020)Robust application identification methods for P2P and VoIP traffic classification in backbone networks., , , and . Knowl. Based Syst., (2015)Behavior spectrum: An effective method for user's web access behavior monitoring and measurement., , , and . GLOBECOM, page 961-966. IEEE, (2012)IIS: Intelligent Identification Scheme of Massive IoT Devices., , , , , and . COMPSAC, page 1623-1626. IEEE, (2021)DDoS Attack Detection Method using Entropy and Attention-based BiGRU., , and . HCCS, page 1-6. IEEE, (2023)