Author of the publication

Malware traffic classification using convolutional neural network for representation learning.

, , , , and . ICOIN, page 712-717. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accelerating convolutional neural network-based malware traffic detection through ant-colony clustering., , , and . J. Intell. Fuzzy Syst., 37 (1): 409-423 (2019)Service Differentiation Strategy Based on User Demands for Https Web Servers., , , and . SERA, page 189-194. IEEE Computer Society, (2018)Self-distilled Named Entity Recognition Based on Boundary Detection and Biaffine Attention., , , , and . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, page 1132-1137. IEEE, (2022)Vertical Federated Learning: Concepts, Advances, and Challenges., , , , , , , , and . IEEE Trans. Knowl. Data Eng., 36 (7): 3615-3634 (July 2024)A storage approach for OpenFlow switch based on Protocol Oblivious Forwarding., , , , and . ISCC, page 1145-1150. IEEE Computer Society, (2016)Data-Driven MoE: A Data-Driven Approach to Construct MoE by a Single LLM., , , , and . ICIC (LNAI 4), volume 14878 of Lecture Notes in Computer Science, page 352-363. Springer, (2024)Protocol-Aware Packet Scheduling Algorithm for Multi-Protocol Processing in Multi-Core MPL Architecture., , , , and . IEICE Trans. Inf. Syst., 100-D (12): 2837-2846 (2017)Applying Multiple-Correlations of Network to Cell Traffic Forecasting., , , , , and . GLOBECOM, page 7405-7410. IEEE, (2023)Machine Learning Techniques for Sensor-based Human Activity Recognition with Data Heterogeneity - A Review., , , and . CoRR, (2024)Cross-user activity recognition using deep domain adaptation with temporal relation information., , , and . CoRR, (2024)