Author of the publication

Mining Long-Term Stealthy User Behaviors on High Speed Links.

, , , and . INFOCOM, page 2051-2059. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Monitoring abnormal network traffic based on blind source separation approach., , , , and . J. Netw. Comput. Appl., 34 (5): 1732-1742 (2011)Sampling node pairs over large graphs., , , , and . ICDE, page 781-792. IEEE Computer Society, (2013)Contrastive Representation based Active Learning for Time Series., , , and . DASC/PiCom/CBDCom/CyberSciTech, page 1-6. IEEE, (2022)A New Data Streaming Method for Locating Hosts with Large Connection Degree., , and . GLOBECOM, page 1-6. IEEE, (2009)Multi-Action Dialog Policy Learning from Logged User Feedback., , , , , , , and . AAAI, page 13976-13983. AAAI Press, (2023)SegFormer: A Topic Segmentation Model with Controllable Range of Attention., , , and . AAAI, page 12545-12552. AAAI Press, (2023)Unbiased Characterization of Node Pairs over Large Graphs., , , , and . ACM Trans. Knowl. Discov. Data, 9 (3): 22:1-22:27 (2015)I/O-efficient calculation of H-group closeness centrality over disk-resident graphs., , , , and . Inf. Sci., (2017)MERGE: Fast Private Text Generation., , , , and . CoRR, (2023)Efficiently Estimating Subgraph Statistics of Large Networks in the Dark., , , , , and . CoRR, (2013)