Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algorithms for Congestion Detection and Control., , , , and . GCC Workshops, volume 3252 of Lecture Notes in Computer Science, page 374-381. Springer, (2004)IABA: An improved PNN Algorithm for anomaly detection in network security management., , , and . ICNC, page 335-339. IEEE, (2010)Measuring Privacy Threats in China-Wide Mobile Networks., , , , , and . FOCI @ USENIX Security Symposium, USENIX Association, (2018)ValCAT: Variable-Length Contextualized Adversarial Transformations Using Encoder-Decoder Language Model., , , , , and . NAACL-HLT, page 1735-1746. Association for Computational Linguistics, (2022)XML Based X.509 Authorization in CERNET Grid., , , , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 325-332. Springer, (2004)An Admission Control Policy Based on Social Networks for P2P Systems., and . WAIM, page 487-492. IEEE Computer Society, (2008)Anomaly Internet Network Traffic Detection by Kernel Principle Component Classifier., , , , , , and . ISNN (3), volume 3498 of Lecture Notes in Computer Science, page 476-481. Springer, (2005)Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation., , , , , , , , , and . SRDS, page 1-10. IEEE Computer Society, (2018)Who is answering my queries: understanding and characterizing interception of the DNS resolution path., , , , , , and . ANRW, page 15-16. ACM, (2019)MAF-SAM: An effective method to perceive data plane threats of inter domain routing system., , , and . Comput. Networks, (2016)