Author of the publication

DTRadar: Accelerating Search Process of Decision Trees in Packet Classification.

, , , , and . ISCC, page 335-341. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks., , , , , , , and . ACM Trans. Priv. Secur., 25 (3): 23:1-23:24 (2022)Evolving defense mechanism for future network security., , , , , , and . IEEE Commun. Mag., 53 (4): 45-51 (2015)GAAT: Group Adaptive Adversarial Training to Improve the Trade-Off Between Robustness and Accuracy., , , , , , and . Int. J. Pattern Recognit. Artif. Intell., 36 (13): 2251015:1-2251015:26 (2022)Eliminating Control Plane Overload via Measurement Task Placement., , , , , , and . IEEE/ACM Trans. Netw., 31 (4): 1717-1731 (August 2023)An Approach for Crowd Density and Crowd Size Estimation., , , , and . J. Softw., 9 (3): 757-762 (2014)Towards desirable decision boundary by Moderate-Margin Adversarial Training., , , , , , and . Pattern Recognit. Lett., (September 2023)A Review of Geological Applications of High-Spatial-Resolution Remote Sensing Data., , , and . J. Circuits Syst. Comput., 29 (6): 2030006:1-2030006:23 (2020)Wireless big data in cellular networks: the cornerstone of smart cities., , , , and . IET Commun., 12 (13): 1517-1523 (2018)Traffic matrix estimation: A neural network approach with extended input and expectation maximization iteration., , , and . J. Netw. Comput. Appl., (2016)A Practical Black-Box Attack on Source Code Authorship Identification Classifiers., , , and . IEEE Trans. Inf. Forensics Secur., (2021)