Author of the publication

You Are How You Use: Catching Gas Theft Suspects among Diverse Restaurant Users.

, , , , , , and . CIKM, page 2885-2892. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

You Are How You Use: Catching Gas Theft Suspects among Diverse Restaurant Users., , , , , , and . CIKM, page 2885-2892. ACM, (2020)MFL-RAT: Multi-class Few-Shot Learning Method for Encrypted RAT Traffic Detection., , , , , , , and . Inscrypt (1), volume 14526 of Lecture Notes in Computer Science, page 452-471. Springer, (2023)Gas-Theft Suspect Detection Among Boiler Room Users: A Data-Driven Approach., , , , , , and . IEEE Trans. Knowl. Data Eng., 34 (12): 5796-5808 (2022)Robust Spatio-Temporal Purchase Prediction via Deep Meta Learning., , , , , and . AAAI, page 4312-4319. AAAI Press, (2021)Spatial Density-based User Identity Linkage across Social Networks., , , , , , , and . IEEE Big Data, page 656-664. IEEE, (2022)ER-ERT:A Method of Ensemble Representation Learning of Encrypted RAT Traffic., , , , , , , , and . IFIP Networking, page 1-10. IEEE, (2023)DNS Tunnel Detection for Low Throughput Data Exfiltration via Time-Frequency Domain Analysis., , , , , , , , , and . ICC, page 2331-2337. IEEE, (2023)Discovering Actual Delivery Locations from Mis-Annotated Couriers' Trajectories., , , , , , , , , and . ICDE, page 3241-3253. IEEE, (2022)Network-Wide Traffic States Imputation Using Self-interested Coalitional Learning., , , , and . KDD, page 1370-1378. ACM, (2021)Cell Manipulation Attack Against Onion Services., , , , , , and . HPCC/DSS/SmartCity/DependSys, page 58-65. IEEE, (2023)