Author of the publication

SeAuNet: Semi-Autonomous Encrypted Traffic Classification and Self-labeling.

, , , , and . CSCWD, page 1914-1919. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tripartite evolutionary game in the process of network attack and defense., , , , , , and . Telecommun. Syst., 86 (2): 351-361 (June 2024)MemInspect: Memory Forensics for investigating Fileless Attacks., , , , , , and . TrustCom, page 946-955. IEEE, (2023)An explainable deepfake of speech detection method with spectrograms and waveforms., , , , and . J. Inf. Secur. Appl., (2024)AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs., , , , , , and . SecureComm, volume 462 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 510-528. Springer, (2022)SeAuNet: Semi-Autonomous Encrypted Traffic Classification and Self-labeling., , , , and . CSCWD, page 1914-1919. IEEE, (2023)Improving Adversarial Robustness via Channel and Depth Compatibility., , , , , and . ADMA (5), volume 14180 of Lecture Notes in Computer Science, page 137-149. Springer, (2023)Enhancing Adversarial Robustness for Deep Metric Learning through Adaptive Adversarial Strategy., , , , and . CSCWD, page 29-34. IEEE, (2023)A method for recovering adversarial samples with both adversarial attack forensics and recognition accuracy., , , , , , and . Comput. Secur., (2024)A Framework of Darknet Forensics., and . AISS, page 31:1-31:6. ACM, (2021)