Author of the publication

Evicting and filling attack for linking multiple network addresses of Bitcoin nodes.

, , , , , , and . Cybersecur., 6 (1): 50 (December 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wind-Thermal-CSP Bundling Model With an Adjustable Heat Storage Strategy for CSP Stations., , , , , , , , and . IEEE Access, (2021)Event Detection with Relation-Aware Graph Convolutional Neural Networks., , , , , and . CoRR, (2020)How Well Do Large Language Models Understand Syntax? An Evaluation by Asking Natural Language Questions., , , , , , and . CoRR, (2023)Adaptive Data Augmentation for Aspect Sentiment Quad Prediction., , , , , and . CoRR, (2024)Identification Domain Fronting Traffic for Revealing Obfuscated C2 Communications., , , , , and . DSC, page 91-98. IEEE, (2021)2ch-TCN: A Website Fingerprinting Attack over Tor Using 2-channel Temporal Convolutional Networks., , , , , and . ISCC, page 1-7. IEEE, (2020)A Fuzzy Appraisement-based Applied Study on High-temperature Corrosion of a Thermal Power Plant., , , , and . FSKD (5), page 227-231. IEEE Computer Society, (2009)Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification Under Obfs4 Scenario., , , , , and . ICEA, page 205-210. ACM, (2021)SPEFL: Efficient Security and Privacy-Enhanced Federated Learning Against Poisoning Attacks., , , , , , , and . IEEE Internet Things J., 11 (8): 13437-13451 (April 2024)Perceived usefulness predicts second language learners' continuance intention toward language learning applications: a serial multiple mediation model of integrative motivation and flow., , , , , , and . Educ. Inf. Technol., 27 (4): 5033-5049 (2022)