Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classifying imbalanced Internet traffic based PCDD: a per concept drift detection method., , and . Smart CR, 3 (2): 112-122 (2013)Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services., , , and . USENIX Security Symposium, page 687-702. USENIX Association, (2013)Real-time Soft Robot 3D Proprioception via Deep Vision-based Sensing., , , , , and . CoRR, (2019)A System for Linking Ground Truth to Mobile Network Traffic., , , and . MobiQuitous, page 292-293. ACM, (2016)HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security., , , , , and . USENIX Security Symposium, page 99-116. USENIX Association, (2018)Sleak: automating address space layout derandomization., , , , , and . ACSAC, page 190-202. ACM, (2019)SmoteAdaNL: a learning method for network traffic classification., , and . J. Ambient Intelligence and Humanized Computing, 7 (1): 121-130 (2016)First-principles study on the electro-mechanical coupling of the Si/Ge core-shell nanowires., , , , and . NEMS, page 833-836. IEEE, (2013)A Novel Method of Filtering Internet Background Radiation Traffic., , and . EIDWT, page 371-376. (2013)Driller: Augmenting Fuzzing Through Selective Symbolic Execution., , , , , , , , and . NDSS, The Internet Society, (2016)