Author of the publication

snWF: Website Fingerprinting Attack by Ensembling the Snapshot of Deep Learning.

, , , , and . IEEE Trans. Inf. Forensics Secur., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Input-free cascode Vthn and Vthp extractor circuits., , and . ICECS, page 282-285. IEEE, (2004)An immersive multi-agent system for interactive applications., , , and . Vis. Comput., 29 (5): 323-332 (2013)An analytical framework for reliability evaluation of d-dimensional IEEE 802.11 broadcast wireless networks., , , , , and . Wirel. Networks, 26 (5): 3373-3394 (2020)CMM: A Combination-Based Mutation Method for SQL Injection., , , and . SOFL+MSVL, volume 12028 of Lecture Notes in Computer Science, page 345-361. Springer, (2019)snWF: Website Fingerprinting Attack by Ensembling the Snapshot of Deep Learning., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)A Large-Scale Pretrained Deep Model for Phishing URL Detection., , , , , and . ICASSP, page 1-5. IEEE, (2023)Software Maintenance Optimization Based on Stackelberg Game Methods., , , , , , and . ISSRE Workshops, page 426-430. IEEE Computer Society, (2014)Struggle with Adversarial Defense? Try Diffusion., , , , , , and . CoRR, (2024)Separation of P- and SV-wavefields from multi-component seismic data in the tau-p domain, , and . Geophysical Journal International, 151 (2): 663--672 (November 2002)Mixed reality prototyping for usability evaluation in product design: a case study of a handheld printer., , , , and . Virtual Real., 28 (1): 6 (March 2024)