Author of the publication

Important Member Discovery of Attribution Trace Based on Relevant Circle (Short Paper).

, , , and . CollaborateCom, volume 268 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 222-232. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks., , , , and . ISCC, page 1-7. IEEE, (2020)A 1-5GHz Inverter-Based Phase Interpolator with All Digital Control for Spin-Wave Detection Circuit., , , , , , , and . ICICDT, page 88-91. IEEE, (2023)LIFH: Learning Interactive Features from HTTP Payload using Image Reconstruction., , , , and . ICC, page 1-6. IEEE, (2021)RAAM: A Restricted Adversarial Attack Model with Adding Perturbations to Traffic Features., , , , , and . SEC, volume 648 of IFIP Advances in Information and Communication Technology, page 126-141. Springer, (2022)Design of 1-5 GHz Two-Stage Noise-Canceling Low-Noise Amplifier with gm-boosting Technique for Spin Wave Detection Circuit., , , , , , , and . ICICDT, page 92-95. IEEE, (2023)Important Member Discovery of Attribution Trace Based on Relevant Circle (Short Paper)., , , and . CollaborateCom, volume 268 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 222-232. Springer, (2018)MUI-defender: CNN-Driven, Network Flow-Based Information Theft Detection for Mobile Users., , , , and . CollaborateCom, volume 268 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 329-345. Springer, (2018)TCCN: A Network Traffic Classification and Detection Model Based on Capsule Network., , , , , and . ICC, page 2319-2324. IEEE, (2023)GPMT: Generating practical malicious traffic based on adversarial attacks with little prior knowledge., , , , , and . Comput. Secur., (2023)TrafficGCN: Mobile Application Encrypted Traffic Classification Based on GCN., , , , , and . GLOBECOM, page 891-896. IEEE, (2022)