Author of the publication

6GAN: IPv6 Multi-Pattern Target Generation via Generative Adversarial Nets with Reinforcement Learning.

, , , , , and . INFOCOM, page 1-10. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hybrid Local Feature for Face Recognition., , and . PRICAI, volume 7458 of Lecture Notes in Computer Science, page 64-75. Springer, (2012)MMCo: using multimodal deep learning to detect malicious traffic with noisy labels., , , and . Frontiers Comput. Sci., 18 (1): 181809 (February 2024)TunnelScanner: A Novel Approach For Tunnel Mixed Traffic Classification Using Machine Learning., , , , , and . HPCC/DSS/SmartCity/DependSys, page 309-318. IEEE, (2021)An Analysis of Anomalous User Agent Strings in Network Traffic., , and . HPCC/SmartCity/DSS, page 1771-1778. IEEE, (2019)Towards Multi-source Extension: A Multi-classification Method Based on Sampled NetFlow Records., , , , , , , and . TrustCom, page 1069-1076. IEEE, (2021)Old Habits Die Hard: A Sober Look at TLS Client Certificates in the Real World., , , , , , and . TrustCom, page 83-90. IEEE, (2021)TA-GAN: GAN based Traffic Augmentation for Imbalanced Network Traffic Classification., , , , , and . IJCNN, page 1-8. IEEE, (2021)Not Afraid of the Unseen: a Siamese Network based Scheme for Unknown Traffic Discovery., , , , , and . ISCC, page 1-7. IEEE, (2020)Identify OS from encrypted traffic with TCP/IP stack fingerprinting., , , , and . IPCCC, page 1-7. IEEE, (2019)I Know What You Are Doing With Remote Desktop., , , and . IPCCC, page 1-7. IEEE, (2019)