Author of the publication

Winding Path: Characterizing the Malicious Redirection in Squatting Domain Names.

, , , and . PAM, volume 12671 of Lecture Notes in Computer Science, page 93-107. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Stacking Approach to Objectionable-Related Domain Names Identification by Passive DNS Traffic (Short Paper)., , , , and . CollaborateCom, volume 268 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 284-294. Springer, (2018)Leopard: Understanding the Threat of Blockchain Domain Name Based Malware., , and . PAM, volume 12048 of Lecture Notes in Computer Science, page 55-70. Springer, (2020)Due to the global outbreak of COVID-19, the PAM 2020 conference was organized as a virtual meeting..TCCN: A Network Traffic Classification and Detection Model Based on Capsule Network., , , , , and . ICC, page 2319-2324. IEEE, (2023)A Multi-feature-based Approach to Malicious Domain Name Identification from DNS Traffic., , , , and . ICT, page 1-5. IEEE, (2020)Incremental Learning for Mobile Encrypted Traffic Classification., , , , , and . ICC, page 1-6. IEEE, (2021)Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach., , , , and . ICNP, page 1-11. IEEE, (2019)MTCD-Model: A Two-Layer Model for Malicious Traffic Classification and Detection Based on Hierarchical Feature Learning., , , and . IJCNN, page 1-8. IEEE, (2023)Explainable Text Classification via Attentive and Targeted Mixing Data Augmentation., , , , , , , and . IJCAI, page 5085-5094. ijcai.org, (2023)Detecting Domain Generation Algorithms with Convolutional Neural Language Models., , , , , and . TrustCom/BigDataSE, page 1360-1367. IEEE, (2018)Cooperative Work Systems for the Security of Digital Computing Infrastructure., , , , and . ICPADS, page 676-681. IEEE Computer Society, (2010)