Author of the publication

Classification Method of Encrypted Traffic Based on Deep Neural Network.

, , , , , , and . ICPCSEE (2), volume 1059 of Communications in Computer and Information Science, page 528-544. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fixed-time tracking control of manipulators based on non-singular fast terminal sliding surface., , , and . J. Intell. Fuzzy Syst., 46 (1): 2971-2979 (January 2024)Multi-Agent Attention Double Actor-Critic Framework for Intelligent Traffic Light Control in Urban Scenarios With Hybrid Traffic., , , , , , , and . IEEE Trans. Mob. Comput., 23 (1): 660-672 (January 2024)Privacy-Preserving Data Scheduling in Incentive-Driven Vehicular Network., , , , and . IEEE Internet Things J., 9 (22): 22669-22681 (2022)Adaptive event-triggered control for a family of uncertain switched nonlinear systems with full-state constraints., , , and . Inf. Sci., (May 2023)A spatio-temporal sequence-to-sequence network for traffic flow prediction., , , , and . Inf. Sci., (2022)Privacy-preserving auditing scheme for shared data in public clouds., , , and . J. Supercomput., 74 (11): 6156-6183 (2018)Security analysis of a publicly verifiable data possession scheme for remote storage., , , and . J. Supercomput., 73 (11): 4923-4930 (2017)PCNNCEC: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration., , , , , and . IEEE Trans. Netw. Sci. Eng., 10 (5): 2906-2923 (September 2023)An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography., , , , and . Wirel. Pers. Commun., 85 (1): 225-240 (2015)Poisoning-Assisted Property Inference Attack Against Federated Learning., , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 3328-3340 (July 2023)