Author of the publication

Transfer Learning for User Action Identication in Mobile Apps via Encrypted Trafc Analysis.

, , , , , , and . IEEE Intell. Syst., 33 (2): 40-53 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving malware detection by applying multi-inducer ensemble., , , and . Comput. Stat. Data Anal., 53 (4): 1483-1494 (2009)IP2User - Identifying the Username of an IP Address in Network-Related Events., , , , , , , and . BigData Congress, page 435-436. IEEE Computer Society, (2013)OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage., , , and . IEEE Trans. Knowl. Data Eng., 26 (3): 682-697 (2014)Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities., , , , , , , and . CoRR, (2020)Vesper: Using Echo Analysis to Detect Man-in-the-Middle Attacks in LANs., , , and . IEEE Trans. Inf. Forensics Secur., 14 (6): 1638-1653 (2019)M-Score: A Misuseability Weight Measure., , , and . IEEE Trans. Dependable Secur. Comput., 9 (3): 414-428 (2012)An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions., , , , , and . CoRR, (2020)Hierarchical Deep Reinforcement Learning Approach for Multi-Objective Scheduling With Varying Queue Sizes., , , and . CoRR, (2020)Fairness Matters - A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems., , , , , , , and . CoRR, (2020)Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples., , , , and . CoRR, (2020)