Author of the publication

Malicious encrypted traffic features extraction model based on unsupervised feature adaptive learning.

, , , , , , and . J. Comput. Virol. Hacking Tech., 18 (4): 453-463 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Input-output finite-time stabilization of a class of nonlinear hybrid systems based on FSM with MDADT., and . J. Frankl. Inst., 354 (9): 3797-3812 (2017)Understanding Acdamic Impact Development by Predicting the G-index In Collaboration Networks., , , and . DSC, page 662-667. IEEE, (2019)Implementing a passive network covert timing channel., , , and . Comput. Secur., 29 (6): 686-696 (2010)SE_EDNet: A Robust Manipulated Faces Detection Algorithm., , , , and . CGI, volume 13002 of Lecture Notes in Computer Science, page 80-88. Springer, (2021)Natural Language Inference Based on the LIC Architecture with DCAE Feature., , , , and . CCL, volume 11856 of Lecture Notes in Computer Science, page 587-599. Springer, (2019)Evolutionary Game Based Analysis for User Privacy Protection Behaviors in Social Networks., , and . DSC, page 274-279. IEEE, (2018)Evaluating the transmission rate of covert timing channels in a network., , , , and . Comput. Networks, 55 (12): 2760-2771 (2011)A study of on/off timing channel based on packet delay distribution., , , and . Comput. Secur., 28 (8): 785-794 (2009)Classification of botnet families based on features self-learning under Network Traffic Censorship., , , , , and . SSIC, page 1-7. IEEE, (2018)Constructing the On/Off Covert Channel on Xen., , , , and . CIS, page 568-572. IEEE Computer Society, (2012)