Author of the publication

AAP: Defending Against Website Fingerprinting Through Burst Obfuscation.

, , , , , and . ADMA (5), volume 14180 of Lecture Notes in Computer Science, page 107-121. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SAIDR: A New Dynamic Model for SMS-Based Worm Propagation in Mobile Networks., , , , , and . IEEE Access, (2017)Modeling and validation of SMS worm propagation over social networks., , , , and . J. Comput. Sci., (2017)A lightweight and high-precision approach for bulky JavaScript engines fuzzing., , , , , and . TrustCom, page 982-989. IEEE, (2023)ReviewLocator: Enhance User Review-Based Bug Localization with Bug Reports., , , , , and . ADMA (5), volume 14180 of Lecture Notes in Computer Science, page 122-136. Springer, (2023)DetOH: An Anchor-Free Object Detector with Only Heatmaps., , , , , and . ADMA (2), volume 14177 of Lecture Notes in Computer Science, page 152-167. Springer, (2023)Non-local Self-attention Structure for Function Approximation in Deep Reinforcement Learning., , , , , , , and . ICASSP, page 3042-3046. IEEE, (2019)Balancer: A Traffic-Aware Hybrid Rule Allocation Scheme in Software Defined Networks., , , , and . ICCCN, page 1-9. IEEE, (2017)Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack., , , , , , and . IEEE Access, (2018)SAVT: A Practical Scheme for Source Address Validation and Traceback in Campus Network., , , and . ICCCN, page 1-8. IEEE, (2011)BehavSniffer: Sniff User Behaviors from the Encrypted Traffic by Traffic Burst Graphs., , , , , , and . SECON, page 456-464. IEEE, (2023)