Author of the publication

A Distance-Based Method for Building an Encrypted Malware Traffic Identification Framework.

, , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Distance-Based Method for Building an Encrypted Malware Traffic Identification Framework., , , and . IEEE Access, (2019)Sneaking Through Security: Mutating Live Network Traffic to Evade Learning-Based NIDS., , , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 2295-2308 (2022)A Novel Android Malware Detection Method Based on Visible User Interface., , , , , and . TrustCom, page 659-666. IEEE, (2021)Utility-Aware Privacy-Preserving Federated Learning through Information Bottleneck., , , and . TrustCom, page 680-686. IEEE, (2022)GSMI: A Gradient Sign Optimization Based Model Inversion Method., , , and . AI, volume 13151 of Lecture Notes in Computer Science, page 67-78. Springer, (2022)Machine Unlearning via Representation Forgetting With Parameter Self-Sharing., , , and . IEEE Trans. Inf. Forensics Secur., (2024)Construct New Graphs Using Information Bottleneck Against Property Inference Attacks., , , and . ICC, page 765-770. IEEE, (2023)Inferring Private Data from AI Models in Metaverse through Black-box Model Inversion Attacks., , , and . MetaCom, page 49-56. IEEE, (2023)Modeling and Analyzing the Spatial-Temporal Propagation of Malware in Mobile Wearable IoT Networks., , , , and . IEEE Internet Things J., 11 (2): 2438-2452 (January 2024)Generative Adversarial Networks: A Survey on Attack and Defense Perspective., , , and . ACM Comput. Surv., 56 (4): 91:1-91:35 (April 2024)