Author of the publication

Real-Time Malicious Traffic Detection With Online Isolation Forest Over SD-WAN.

, , , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust and adaptive backstepping control for nonlinear systems using RBF neural networks., , , and . IEEE Trans. Neural Networks, 15 (3): 693-701 (2004)A Temperature Drift Compensation Method for Pulsed Eddy Current Technology., , , and . Sensors, 18 (6): 1952 (2018)Harmonic Modeling of the Series-Connected Multipulse Rectifiers Under Unbalanced Conditions., , , , , and . IEEE Trans. Ind. Electron., 70 (7): 6494-6505 (July 2023)SWDet: Anchor-Based Object Detector for Solid Waste Detection in Aerial Images., , , , , , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., (2023)ACCeSS: Adaptive QoS-aware Congestion Control for Multipath TCP., , , , , and . IWQoS, page 1-10. IEEE, (2022)The Catastrophe Analysis of Shanghai Crude Oil Futures Price from the Perspective of Volatility Factors., , , , and . Complex., (2022)Assisting reachability verification of network configurations updates with NUV., , , , , , , and . Comput. Networks, (2020)Barrier Lyapunov functions-based localized adaptive neural control for nonlinear systems with state and asymmetric control constraints., , , and . Trans. Inst. Meas. Control, 41 (6): 1656-1664 (2019)Network Traffic Classification by Program Synthesis., , , and . TACAS (1), volume 12651 of Lecture Notes in Computer Science, page 430-448. Springer, (2021)An Improved Method of Access Control Based on BLP Model in MILS., , , and . CIS, page 588-592. IEEE Computer Society, (2014)