Author of the publication

Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks.

, , , , , and . NDSS, The Internet Society, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Increasing multicast transmission rate with localized multipath in software-defined networks., and . Frontiers Comput. Sci., 13 (2): 413-425 (2019)Classification of Benign and Malignant Pulmonary Nodules Based on the Multiresolution 3D DPSECN Model and Semisupervised Clustering., , , , and . IEEE Access, (2021)Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs., , , , , , , , and . NDSS, The Internet Society, (2019)Construction and verification of retinal vessel segmentation algorithm for color fundus image under BP neural network model., and . J. Supercomput., 77 (4): 3870-3884 (2021)3DBody Software Experimental Platform for Course of Sports Anatomy., , and . Int. J. Emerg. Technol. Learn., 12 (9): 4-16 (2017)Clues in Tweets: Twitter-Guided Discovery and Analysis of SMS Spam., , , , and . CCS, page 2751-2764. ACM, (2022)Application of deep learning and XGBoost in predicting pathological staging of breast cancer MR images., , , , , , and . J. Supercomput., 80 (7): 8933-8953 (May 2024)Stealthy Peers: Understanding Security Risks of WebRTC-Based Peer-Assisted Video Streaming., , , , , and . CoRR, (2022)Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering., , , , , , and . CoRR, (2023)Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting Referral., , , , , and . ACM Conference on Computer and Communications Security, page 1307-1322. ACM, (2020)