Author of the publication

ProNet: Toward Payload-Driven Protocol Fingerprinting via Convolutions and Embeddings.

, , and . CollaborateCom, volume 252 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 519-529. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning domain invariant and specific representation for cross-domain person re-identification., , , , , and . Appl. Intell., 51 (8): 5219-5232 (2021)Learn from Noise: Detecting Deepfakes via Regional Noise Consistency., , , , , , , and . IJCNN, page 1-8. IEEE, (2024)ProNet: Toward Payload-Driven Protocol Fingerprinting via Convolutions and Embeddings., , and . CollaborateCom, volume 252 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 519-529. Springer, (2017)Face swapping detection based on identity spatial constraints with weighted frequency division., , , , and . Multim. Syst., 29 (2): 627-640 (April 2023)Anomaly detection of traffic session based on graph neural network., , , and . CSW, page 1-9. ACM, (2022)MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query., , , and . ICICS, volume 11149 of Lecture Notes in Computer Science, page 685-695. Springer, (2018)MalShoot: Shooting Malicious Domains Through Graph Embedding on Passive DNS Data., , , and . CollaborateCom, volume 268 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 488-503. Springer, (2018)Evading Encrypted Traffic Classifiers by Transferable Adversarial Traffic., , , , , and . CollaborateCom (2), volume 461 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 153-173. Springer, (2022)Exploiting Heterogeneous Information for IoT Device Identification Using Graph Convolutional Network., , , , and . CollaborateCom (1), volume 406 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 575-591. Springer, (2021)Unsupervised Cross-Domain Person Re-identification Based on Style Transfer., , , and . ICIC (1), volume 11643 of Lecture Notes in Computer Science, page 54-64. Springer, (2019)