Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Website Fingerprinting Attack on Anonymity Networks Based on Profile Hidden Markov Model., , , , and . IEEE Trans. Inf. Forensics Secur., 13 (5): 1081-1095 (2018)A multi-granularity heuristic-combining approach for censorship circumvention activity identification., , , , and . Secur. Commun. Networks, 9 (16): 3178-3189 (2016)Latent Gaussian process for anomaly detection in categorical data., , , , , and . Knowl. Based Syst., (2021)Long short-term memory on abstract syntax tree for SQL injection detection., , , and . IET Softw., 15 (2): 188-197 (2021)A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification., , , , , and . IEEE Trans. Veh. Technol., 68 (4): 3843-3853 (2019)Improving data field hierarchical clustering using Barnes-Hut algorithm., , , , and . Pattern Recognit. Lett., (2016)A temporal correlation and traffic analysis approach for APT attacks detection., , , and . Clust. Comput., 22 (Supplement): 7347-7358 (2019)Phishing Emails Detection Using CS-SVM., , , , and . ISPA/IUCC, page 1054-1059. IEEE, (2017)Integrating Traffics with Network Device Logs for Anomaly Detection., , , , , , and . Secur. Commun. Networks, (2019)Adversarial attacks against profile HMM website fingerprinting detection model., , , , , and . Cogn. Syst. Res., (2019)