Author of the publication

Malware traffic classification using convolutional neural network for representation learning.

, , , , and . ICOIN, page 712-717. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

End-to-end encrypted traffic classification with one-dimensional convolution neural networks., , , , and . ISI, page 43-48. IEEE, (2017)A storage approach for OpenFlow switch based on Protocol Oblivious Forwarding., , , , and . ISCC, page 1145-1150. IEEE Computer Society, (2016)Multi-model coupling method for imbalanced network traffic classification based on clustering., , and . Int. J. High Perform. Comput. Netw., 16 (1): 26-35 (2020)High Throughput Implementation of SMS4 on FPGA., , and . IEEE Access, (2019)A Packet-Length-Adjustable Attention Model Based on Bytes Embedding Using Flow-WGAN for Smart Cybersecurity., , and . IEEE Access, (2019)Optimal Buffer Management Strategy for Minimizing Delivery Latency of Streaming Data with Packet Dependencies., , , and . IEICE Trans. Commun., 99-B (7): 1501-1510 (2016)Goodput guaranteed buffer management strategy for streaming data with packet dependencies., , , and . ISCC, page 880-885. IEEE Computer Society, (2016)High-Performance Implementation of Dynamically Configurable Load Balancing Engine on FPGA., , , and . IEEE Communications Magazine, 58 (1): 62-67 (2020)Accelerating the SM3 hash algorithm with CPU-FPGA Co-Designed architecture., , , and . IET Comput. Digit. Tech., 15 (6): 427-436 (2021)HAST-IDS: Learning Hierarchical Spatial-Temporal Features Using Deep Neural Networks to Improve Intrusion Detection., , , , , , and . IEEE Access, (2018)