Author of the publication

On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers.

, , , , and . AsiaCCS, page 61-69. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An integrated inverse space sparse representation framework for tumor classification., , , , , , and . Pattern Recognit., (2019)Novel BD MU-MIMO Pre-Coding Methods to Suppress Noise and Balance Receive Antennas., , , and . VTC Fall, page 1-5. IEEE, (2008)Billing Attacks on SIP-Based VoIP Systems., , , and . WOOT, USENIX Association, (2007)TrafficSCINet: An Adaptive Spatial-Temporal Graph Convolutional Network for Traffic Flow Forecasting., , , , and . ICIC (1), volume 14086 of Lecture Notes in Computer Science, page 628-639. Springer, (2023)An Online Adaptive Network Anomaly Detection Model., , , , and . CSO (2), page 365-368. IEEE Computer Society, (2009)978-0-7695-3605-7.Driver's Gaze Zone Estimation Method: A Four-channel Convolutional Neural Network Model., , and . BDSIC, page 20-24. ACM, (2020)Multiple Key-value Strategy in Recommendation Systems Incorporating Large Language Model., , , , , and . CoRR, (2023)Robust EEG feature learning model based on an adaptive weight and pairwise-fused LASSO., , , , and . Biomed. Signal Process. Control., (2021)HMMCF: A human-computer collaboration algorithm based on multimodal intention of reverse active fusion., , , and . Int. J. Hum. Comput. Stud., (2023)A zero-knowledge-proof-based digital identity management scheme in blockchain., and . Comput. Secur., (2020)