Author of the publication

Mining Long-Term Stealthy User Behaviors on High Speed Links.

, , , and . INFOCOM, page 2051-2059. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting community structure for undirected big graphs based on random walks., , , , and . WWW (Companion Volume), page 1151-1156. ACM, (2014)Meta Reinforcement Learning with Task Embedding and Shared Policy., , , and . IJCAI, page 2794-2800. ijcai.org, (2019)Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics Analysis., , , and . Trustcom/BigDataSE/ISPA, page 1054-1060. IEEE, (2016)Simulation-based Sensor Allocation for Dynamic Environment Estimation in Cyber-Physical Building System., , , , and . CASE, page 979-984. IEEE, (2019)A hybrid algorithm for scheduling in job shop problem with flexible resources., , and . ICCA, page 1467-1472. IEEE, (2010)On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study., , , and . ICB, page 378-383. IEEE, (2012)A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security., , and . ISNN (2), volume 3174 of Lecture Notes in Computer Science, page 657-662. Springer, (2004)A Fast Sketch Method for Mining User Similarities Over Fully Dynamic Graph Streams., , , and . ICDE, page 1682-1685. IEEE, (2019)A Dynamic Cascading Failure Model Integrating Relay Protection in Power Grid., , , , , , and . CASE, page 1331-1336. IEEE, (2020)Adversarial Example Detection by Classification for Deep Speech Recognition., , , and . ICASSP, page 3102-3106. IEEE, (2020)