Author of the publication

Flow Sequence-Based Anonymity Network Traffic Identification with Residual Graph Convolutional Networks.

, , , , , , and . IWQoS, page 1-10. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tracking the Mobile Jammer Continuously in Time by Using Moving Vector., , , and . ISCID (1), page 43-48. IEEE, (2017)An Efficient Self-Healing Key Distribution with Resistance to the Collusion Attack for Wireless Sensor Networks., and . ICC, page 1-5. IEEE, (2010)Wiretap Channel with Information Embedding on Actions., and . Entropy, 16 (4): 2105-2130 (2014)A Semi-Supervised Federated Learning Scheme via Knowledge Distillation for Intrusion Detection., , , , , and . ICC, page 2688-2693. IEEE, (2022)GeeSolver: A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text Captchas., , , , , , , and . SP, page 1649-1666. IEEE, (2023)A Unified Host-based Intrusion Detection Framework using Spark in Cloud., , and . TrustCom, page 97-103. IEEE, (2020)Flow Sequence-Based Anonymity Network Traffic Identification with Residual Graph Convolutional Networks., , , , , , and . IWQoS, page 1-10. IEEE, (2022)Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Representation., , , , , , and . AAAI, page 5420-5427. AAAI Press, (2023)Two Stochastic Models for Security Evaluation Based on Attack Graph., , , and . ICYCS, page 2198-2203. IEEE Computer Society, (2008)Capacity-Equivocation Region Bounds for Degraded Broadcast Channel with Action-Dependent States., , , , and . CIT, page 263-269. IEEE Computer Society, (2014)