Author of the publication

ITP-KNN: Encrypted Video Flow Identification Based on the Intermittent Traffic Pattern of Video and K-Nearest Neighbors Classification.

, , , , , and . ICCS (2), volume 12138 of Lecture Notes in Computer Science, page 279-293. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graph Watermarks., , , , and . CoRR, (2015)IDNS: A High-Performance Model for Identification of DNS Infrastructures on Large-scale Traffic., , , , and . ISCC, page 1-7. IEEE, (2019)A Spatiotemporally Constrained Interpolation Method for Missing Pixel Values in the Suomi-NPP VIIRS Monthly Composite Images: Taking Shanghai as an Example., , , , , , and . Remote. Sens., 15 (9): 2480 (May 2023)Self-Similarity in Social Network Dynamics., , , , , and . ACM Trans. Model. Perform. Evaluation Comput. Syst., 2 (1): 5:1-5:26 (2016)Multivariate Nonlinear Sparse Mode Decomposition and Its Application in Gear Fault Diagnosis., , , and . IEEE Access, (2021)Redis++: A High Performance In-Memory Database Based on Segmented Memory Management and Two-Level Hash Index., , , , , and . ISPA/IUCC/BDCloud/SocialCom/SustainCom, page 840-847. IEEE, (2018)The Traverse Symplectic Correlation-Gram (TSCgram): A New and Effective Method of Optimal Demodulation Band Selection for Rolling Bearing., , , , , and . IEEE Trans. Instrum. Meas., (2021)RTD: The Road to Encrypted Video Traffic Identification in the Heterogeneous Network Environments., , , , , and . HPCC/DSS/SmartCity/DependSys, page 1697-1704. IEEE, (2022)SAM-TB: a whole genome sequencing data analysis website for detection of Mycobacterium tuberculosis drug resistance and transmission., , , , , , , , , and 2 other author(s). Briefings Bioinform., (2022)SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection., , , , , , and . ISC, volume 14411 of Lecture Notes in Computer Science, page 59-78. Springer, (2023)