From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CAS: Content Attribution System for Network Forensics., , , , и . ISCTCS, том 520 из Communications in Computer and Information Science, стр. 129-136. Springer, (2014)A More Efficient Private Set Intersection Protocol Based on Random OT and Balance Hash., , , и . ICC, стр. 1-7. IEEE, (2019)An automatic approach to extract the formats of network and security log messages., , , , и . MILCOM, стр. 1542-1547. IEEE, (2015)Privacy-Preserving Content-Based Publish/Subscribe Service Based on Order Preserving Encryption., , , , и . IOV, том 11894 из Lecture Notes in Computer Science, стр. 374-381. Springer, (2019)SFV-CNN: Deep Text Sentiment Classification with Scenario Feature Representation., , , , и . MACIS, том 11989 из Lecture Notes in Computer Science, стр. 382-394. Springer, (2019)Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification Under Obfs4 Scenario., , , , , и . ICEA, стр. 205-210. ACM, (2021)PrUE: Distilling Knowledge from Sparse Teacher Networks., , , и . ECML/PKDD (3), том 13715 из Lecture Notes in Computer Science, стр. 102-117. Springer, (2022)Identification Domain Fronting Traffic for Revealing Obfuscated C2 Communications., , , , , и . DSC, стр. 91-98. IEEE, (2021)Mining Open-Source Cyber Threat Intelligence with Distant Supervision from the Web., , , и . DSC, стр. 76-82. IEEE, (2021)A Multi-Level Analysis Framework in Network Security Situation Awareness., , и . ITQM, том 17 из Procedia Computer Science, стр. 530-536. Elsevier, (2013)