Author of the publication

A Behavior-Based Method for Distinguishing the Type of C&C Channel.

, , , , and . ICA3PP (1), volume 11944 of Lecture Notes in Computer Science, page 624-636. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NFDD: A Dynamic Malicious Document Detection Method Without Manual Feature Dictionary., , , , , , and . WASA (2), volume 12938 of Lecture Notes in Computer Science, page 147-159. Springer, (2021)HeterSupervise: Package-level Android Malware Analysis Based on Heterogeneous Graph., , , , , , and . HPCC/DSS/SmartCity, page 328-335. IEEE, (2020)Are we really making much progress?: Revisiting, benchmarking and refining heterogeneous graph neural networks., , , , , , , , , and . KDD, page 1150-1160. ACM, (2021)An Improved Selective Encryption for H.264 Video based on Intra Prediction Mode Scrambling., , , , and . J. Multim., 5 (5): 464-472 (2010)Global-Local Graph Convolutional Network for cross-modality person re-identification., , , , , and . Neurocomputing, (2021)Saliency and Granularity: Discovering Temporal Coherence for Video-Based Person Re-Identification., , , , , and . IEEE Trans. Circuits Syst. Video Technol., 32 (9): 6100-6112 (2022)Person Re-identification based on nonlinear ranking with difference vectors., , , , , and . Inf. Sci., (2014)CIDetector: Semi-Supervised Method for Multi-Topic Confidential Information Detection., , , , , , and . ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 1834-1841. IOS Press, (2020)A Visualization Scheme for Network Forensics Based on Attribute Oriented Induction Based Frequent Item Mining and Hyper Graph., , , , , and . ICDF2C, volume 216 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 130-143. Springer, (2017)Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation., , , , , , , and . MILCOM, page 1-6. IEEE, (2019)