Author of the publication

WeChat traffic classification using machine learning algorithms and comparative analysis of datasets.

, , and . Int. J. Inf. Comput. Secur., 10 (2/3): 109-128 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Operating Systems Through Fine-Grained Kernel Access Limitation for IoT Systems., , , , , and . IEEE Internet Things J., 10 (6, March 15): 5378-5392 (2023)Graph clustering using triangle-aware measures in large networks., , and . Inf. Sci., (2022)A New Approach Customizable Distributed Network Service Discovery System., , and . Wirel. Commun. Mob. Comput., (2021)Hail the Closest Driver on Roads: Privacy-Preserving Ride Matching in Online Ride Hailing Services., , and . Secur. Commun. Networks, (2020)Uncovering overlapping community structure in static and dynamic networks., , and . Knowl. Based Syst., (2020)PSRide: Privacy-Preserving Shared Ride Matching for Online Ride Hailing Systems., , , , and . IEEE Trans. Dependable Secur. Comput., 18 (3): 1425-1440 (2021)Webpage visual feature extraction and similarity algorithm., , and . CIAT, page 80-85. ACM, (2020)Security Mechanisms to Defend against New Attacks on Software-Defined Radio., , , , , , and . ICNC, page 537-541. IEEE Computer Society, (2018)Effective Packet Number for 5G IM WeChat Application at Early Stage Traffic Classification., and . Mob. Inf. Syst., (2017)ErrHunter: Detecting Error-Handling Bugs in the Linux Kernel Through Systematic Static Analysis, , , and . IEEE Transactions on Software Engineering, (2022)