Author of the publication

SiamHAN: IPv6 Address Correlation Attacks on TLS Encrypted Traffic via Siamese Heterogeneous Graph Attention Network.

, , , , , and . USENIX Security Symposium, page 4329-4346. USENIX Association, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Is the Forged Certificates in the Wild: Practice on Large-Scale SSL Usage Measurement and Analysis., , and . ICCS (3), volume 10862 of Lecture Notes in Computer Science, page 654-667. Springer, (2018)Analysing Covertness of Tor Bridge Request., , , , and . ICC, page 5247-5252. IEEE, (2023)Global-Aware Prototypical Network for Few-Shot Encrypted Traffic Classification., , , , , , and . IFIP Networking, page 1-9. IEEE, (2022)TunnelScanner: A Novel Approach For Tunnel Mixed Traffic Classification Using Machine Learning., , , , , and . HPCC/DSS/SmartCity/DependSys, page 309-318. IEEE, (2021)Combating Imbalance in Network Traffic Classification Using GAN Based Oversampling., , , , , and . Networking, page 1-9. IEEE, (2021)POSTER: A Comprehensive Study of Forged Certificates in the Wild., , , and . CCS, page 2487-2489. ACM, (2017)Attack versus Attack: Toward Adversarial Example Defend Website Fingerprinting Attack., , , and . TrustCom, page 766-773. IEEE, (2021)TA-GAN: GAN based Traffic Augmentation for Imbalanced Network Traffic Classification., , , , , and . IJCNN, page 1-8. IEEE, (2021)Covertness Analysis of Snowflake Proxy Request., , , , and . CSCWD, page 1802-1807. IEEE, (2023)Illuminate the Shadow: A Comprehensive Study of TLS Client Certificate Ecosystem in the Wild., , , , , , and . ICT, page 1-5. IEEE, (2021)