Author of the publication

An empirical study of morphing on network traffic classification.

, , , , , and . CHINACOM, page 227-232. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Theory of commercial application management system and its implementation - AMPS., , , and . Parallel and Distributed Computing and Networks, page 75-83. IASTED/ACTA Press, (2007)SecArch'18: 1st Workshop of Security-Oriented Designs of Computer Architectures and Processors.. ACM Conference on Computer and Communications Security, page 2177. ACM, (2018)Delta-Generalization: High Accuracy Data Release for Privacy Preserving., , , and . Trustcom/BigDataSE/ISPA, page 1861-1866. IEEE, (2016)Validation and Comparison of Seven Land Surface Evapotranspiration Products in the Haihe River Basin, China., , , and . Remote. Sens., 14 (17): 4308 (2022)Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations., , , , and . CoRR, (2022)An Adaptive Resource Sharing Platform for Internet Data Center., , , and . HPCC/EUC, page 1179-1186. IEEE, (2013)A Strategy-Proof Combinatorial Auction-Based Grid Resource Allocation System., , , and . ICA3PP, volume 4494 of Lecture Notes in Computer Science, page 254-266. Springer, (2007)Embedding Learning with Heterogeneous Event Sequence for Insider Threat Detection., , , and . ICTAI, page 947-954. IEEE, (2019)Template-Instance Loss for Offline Handwritten Chinese Character Recognition., , , and . ICDAR, page 315-322. IEEE, (2019)Lasso Screening for Object Categories Recognition Using Multi-directional Context Features., , and . ISKE, page 434-441. IEEE, (2015)