Author of the publication

Zero-relabelling mobile-app identification over drifted encrypted network traffic.

, , , , , and . Comput. Networks, (June 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Covertness Analysis of Snowflake Proxy Request., , , , and . CSCWD, page 1802-1807. IEEE, (2023)Discovering abnormal behaviors via HTTP header fields measurement., , , and . Concurr. Comput. Pract. Exp., (2017)A parallel matrix factorization based recommender by alternating stochastic gradient decent., , , , and . Eng. Appl. Artif. Intell., 25 (7): 1403-1412 (2012)MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Detect the reflection amplification attack based on UDP protocol., , , and . ChinaCom, page 260-265. IEEE Computer Society, (2015)Image-Set Based Collaborative Representation for Face Recognition in Videos., , , , , and . PCM (2), volume 10736 of Lecture Notes in Computer Science, page 498-507. Springer, (2017)ResTor: A Pre-Processing Model for Removing the Noise Pattern in Flow Correlation., , , and . ISCC, page 1-6. IEEE, (2020)An Quick Available-Bandwidth Measurement Method Based on Link Delay Growth Rate., , , and . ICCBN, page 51-57. ACM, (2020)GALG: Linking Addresses in Tracking Ecosystem Using Graph Autoencoder with Link Generation., , , , , and . ECML/PKDD (6), volume 13718 of Lecture Notes in Computer Science, page 270-285. Springer, (2022)CQNet: A Clustering-Based Quadruplet Network for Decentralized Application Classification via Encrypted Traffic., , , , , and . ECML/PKDD (4), volume 12978 of Lecture Notes in Computer Science, page 518-534. Springer, (2021)