Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discovering abnormal behaviors via HTTP header fields measurement., , , and . Concurr. Comput. Pract. Exp., (2017)MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)A parallel matrix factorization based recommender by alternating stochastic gradient decent., , , , and . Eng. Appl. Artif. Intell., 25 (7): 1403-1412 (2012)Covertness Analysis of Snowflake Proxy Request., , , , and . CSCWD, page 1802-1807. IEEE, (2023)Image-Set Based Collaborative Representation for Face Recognition in Videos., , , , , and . PCM (2), volume 10736 of Lecture Notes in Computer Science, page 498-507. Springer, (2017)Detect the reflection amplification attack based on UDP protocol., , , and . ChinaCom, page 260-265. IEEE Computer Society, (2015)ResTor: A Pre-Processing Model for Removing the Noise Pattern in Flow Correlation., , , and . ISCC, page 1-6. IEEE, (2020)ULDC: Unsupervised Learning-Based Data Cleaning for Malicious Traffic With High Noise., , , , , , and . Comput. J., 67 (3): 976-987 (2024)GMAF: A Novel Gradient-Based Model with ArcFace for Network Traffic Classification., , , , and . HPCC/DSS/SmartCity/DependSys, page 291-300. IEEE, (2021)Survey of security supervision on blockchain from the perspective of technology., , , , , and . J. Inf. Secur. Appl., (2021)