From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Discovering abnormal behaviors via HTTP header fields measurement., , , и . Concurr. Comput. Pract. Exp., (2017)Covertness Analysis of Snowflake Proxy Request., , , , и . CSCWD, стр. 1802-1807. IEEE, (2023)MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation., , , , , и . IEEE Trans. Inf. Forensics Secur., (2024)A parallel matrix factorization based recommender by alternating stochastic gradient decent., , , , и . Eng. Appl. Artif. Intell., 25 (7): 1403-1412 (2012)Detect the reflection amplification attack based on UDP protocol., , , и . ChinaCom, стр. 260-265. IEEE Computer Society, (2015)ResTor: A Pre-Processing Model for Removing the Noise Pattern in Flow Correlation., , , и . ISCC, стр. 1-6. IEEE, (2020)Image-Set Based Collaborative Representation for Face Recognition in Videos., , , , , и . PCM (2), том 10736 из Lecture Notes in Computer Science, стр. 498-507. Springer, (2017)Survey of security supervision on blockchain from the perspective of technology., , , , , и . J. Inf. Secur. Appl., (2021)GMAF: A Novel Gradient-Based Model with ArcFace for Network Traffic Classification., , , , и . HPCC/DSS/SmartCity/DependSys, стр. 291-300. IEEE, (2021)GALG: Linking Addresses in Tracking Ecosystem Using Graph Autoencoder with Link Generation., , , , , и . ECML/PKDD (6), том 13718 из Lecture Notes in Computer Science, стр. 270-285. Springer, (2022)