Author of the publication

Accelerating Real-Time Tracking Applications over Big Data Stream with Constrained Space.

, , , , , , , , and . DASFAA (1), volume 11446 of Lecture Notes in Computer Science, page 3-18. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Reused Function Retrieval Method Based on Simhash and Inverted Index., , and . Trustcom/BigDataSE/ISPA, page 937-944. IEEE, (2016)Rethinking robust and accurate application protocol identification., , , , and . Comput. Networks, (2017)SnapFiner: A Page-Aware Snapshot System for Virtual Machines., , , and . IEEE Trans. Parallel Distributed Syst., 29 (11): 2613-2626 (2018)Piccolo: A Fast and Efficient Rollback System for Virtual Machine Clusters., , , and . IEEE Trans. Parallel Distributed Syst., 28 (8): 2328-2341 (2017)Encrypted TLS Traffic Classification on Cloud Platforms., , , , and . IEEE/ACM Trans. Netw., 31 (1): 164-177 (February 2023)HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics., , , , and . Comput. Secur., (2020)Availability analysis of DNSSEC resolution and validation service., , , , and . CHINACOM, page 35-42. IEEE, (2012)HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware., , , , , , , and . EAI Endorsed Trans. Security Safety, 5 (18): e5 (2019)A Method Based on Hierarchical Spatiotemporal Features for Trojan Traffic Detection., , , , and . IPCCC, page 1-8. IEEE, (2019)CCGA: Clustering and Capturing Group Activities for DGA-Based Botnets Detection., , , and . TrustCom/BigDataSE, page 136-143. IEEE, (2019)