Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reap the Harvest on Blockchain: A Survey of Yield Farming Protocols., and . IEEE Trans. Netw. Serv. Manag., 20 (1): 858-869 (March 2023)I Can Still Observe You: Flow-level Behavior Fingerprinting for Online Social Network., , , , and . GLOBECOM, page 6427-6432. IEEE, (2022)Adaptive Distributed Filtering of DDoS Traffic on the Internet., , , , , , and . CoRR, (2023)Application-Layer DDoS Defense with Reinforcement Learning., , and . IWQoS, page 1-10. IEEE, (2020)CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic., , and . RAID, page 482-494. ACM, (2022)On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic., , , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 2211-2226 (July 2024)On the Effectiveness of Distillation in Mitigating Backdoors in Pre-trained Encoder., , , , , , , , , and 2 other author(s). CoRR, (2024)Auto.gov: Learning-based On-chain Governance for Decentralized Finance (DeFi)., , , and . CoRR, (2023)Toward Adaptive DDoS-Filtering Rule Generation., , , , , , and . CNS, page 1-9. IEEE, (2023)How and Why LLMs Use Deprecated APIs in Code Completion? An Empirical Study., , , , , , and . CoRR, (2024)