Author of the publication

TEST: an End-to-End Network Traffic Examination and Identification Framework Based on Spatio-Temporal Features Extraction.

, , , , , and . CoRR, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimating Web Attack Detection via Model Uncertainty from Inaccurate Annotation., , , , , , , and . CSCloud/EdgeCom, page 53-58. IEEE, (2019)All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives., , , , and . Inf. Sci., (2019)LAAEM: A Method to Enhance LDoS Attack., , , , , and . IEEE Communications Letters, 20 (4): 708-711 (2016)Investigating Image Applications Based on Spatial-Frequency Transform and Deep Learning Techniques., , , and . CoRR, (2020)Secure V2X Communication Network based on Intelligent PKI and Edge Computing., , and . IEEE Netw., 34 (2): 172-178 (2020)Analysis of the Centralized Algorithm and the Distributed Algorithm for Parallel Packet Switch., , , and . PDCAT, page 156-161. IEEE Computer Society, (2006)Topological Graph Convolutional Network-Based Urban Traffic Flow and Density Prediction., , , , , and . IEEE Trans. Intell. Transp. Syst., 22 (7): 4560-4569 (2021)An integrated model based on feedforward neural network and Taylor expansion for indicator correlation elimination., , , , and . Intell. Data Anal., 26 (3): 751-783 (2022)Interpreting AI for Networking: Where We Are and Where We Are Going., , , , , and . IEEE Commun. Mag., 60 (2): 25-31 (2022)One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training., , , , , , , and . ICCV, page 4665-4675. IEEE, (2023)