Author of the publication

MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation.

, , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proof of Forward Security for Password-based Authenticated Key Exchange., and . Int. J. Netw. Secur., 7 (3): 335-341 (2008)基于协同地址碰撞的隐蔽认证方法 (Cooperative Address Knocking Based Covert Authentication)., , and . 计算机科学, 43 (9): 175-179 (2016)Designing Truthful Spectrum Auctions for Multi-hop Secondary Networks., , and . IEEE Trans. Mob. Comput., 14 (2): 316-327 (2015)Security Arguments for a Class of ID-based Signatures., , and . IACR Cryptology ePrint Archive, (2007)An Improved Algorithm for uP + vQ Using JSF13., , and . ACNS, volume 3089 of Lecture Notes in Computer Science, page 467-478. Springer, (2004)MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation., , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS., , and . IEEE Communications Letters, 14 (4): 366-368 (2010)An Efficient Key-Evolving Signature Scheme Based on Pairing., and . FTDCS, page 68-73. IEEE Computer Society, (2004)High-Payload Image-Hiding Scheme Based on Best-Block Matching and Multi-layered Syndrome-Trellis Codes., , , , and . WISE (2), volume 8787 of Lecture Notes in Computer Science, page 336-350. Springer, (2014)Collecting Internet Malware Based on Client-side Honeypot., , , , and . ICYCS, page 1493-1498. IEEE Computer Society, (2008)