Author of the publication

An Encrypted Malicious Traffic Detection System Based on Neural Network.

, , , and . CyberC, page 62-70. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gossip-based scalable and reliable group key distribution framework., , , and . InfoSecu, page 53-61. ACM, (2004)iKneeBraces: knee adduction moment evaluation measured by motion sensors in gait detection., , , , , , , and . UbiComp, page 386-391. ACM, (2016)RunPlay: Action Recognition Using Wearable Device Apply on Parkour Game., , , , , , and . UIST (Adjunct Volume), page 133-135. ACM, (2016)SaFeplay: a lightweight portable sensing system to estimate knee adduction moment., , , , , , , and . MUM, page 435-440. ACM, (2017)Winning Rate Prediction Model Based on Monte Carlo Tree Search for Computer Dou Dizhu., , , , , and . IEEE Trans. Games, 13 (2): 123-137 (2021)Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin., , , , , and . CoRR, (2022)Security Framework for Wireless Communications in Smart Distribution Grid., and . IEEE Trans. Smart Grid, 2 (4): 809-818 (2011)Dynamic Enhanced Field Division: An Advanced Localizing and Tracking Middleware., , , , , , and . ACM Trans. Sens. Networks, 15 (1): 2:1-2:26 (2019)OCGEC: One-class Graph Embedding Classification for DNN Backdoor Detection., , , and . CoRR, (2023)Improved Signal Control for Oversaturated Intersection., , and . ITSC, page 81-84. IEEE, (2006)