Author of the publication

A Graph Construction Method for Anomalous Traffic Detection with Graph Neural Networks Using Sets of Flow Data.

, , , and . COMPSAC, page 1017-1018. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption., , , , and . IWSEC, volume 7038 of Lecture Notes in Computer Science, page 210-229. Springer, (2011)A Graph Construction Method for Anomalous Traffic Detection with Graph Neural Networks Using Sets of Flow Data., , , and . COMPSAC, page 1017-1018. IEEE, (2023)Some Bounds and a Construction for Secure Broadcast Encryption., , , and . ASIACRYPT, volume 1514 of Lecture Notes in Computer Science, page 420-433. Springer, (1998)Specific Touch Gesture on Mobile Devices to Find Attractive Phrases in News Browsing., , , and . COMPSAC, page 519-528. IEEE Computer Society, (2014)Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices., and . IWSEC, volume 5312 of Lecture Notes in Computer Science, page 83-99. Springer, (2008)Linear Code Implies Public-Key Traitor Tracing., and . Public Key Cryptography, volume 2274 of Lecture Notes in Computer Science, page 172-187. Springer, (2002)Strongly universal hashing and identification codes via channels., and . IEEE Trans. Inf. Theory, 45 (6): 2091-2095 (1999)