Author of the publication

WDMTI: Wireless Device Manufacturer and Type Identification Using Hierarchical Dirichlet Process.

, , , , , and . MASS, page 19-27. IEEE Computer Society, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graph Watermarks., , , , and . CoRR, (2015)Self-Similarity in Social Network Dynamics., , , , , and . TOMPECS, 2 (1): 5:1-5:26 (2016)VegaStar: An Illegal Domain Detection System on Large-Scale Video Traffic., , , , , and . TrustCom/BigDataSE, page 783-789. IEEE, (2018)Redis++: A High Performance In-Memory Database Based on Segmented Memory Management and Two-Level Hash Index., , , , , and . ISPA/IUCC/BDCloud/SocialCom/SustainCom, page 840-847. IEEE, (2018)Unsupervised clustering analysis of SARS-Cov-2 population structure reveals six major subtypes at early stage across the world., , , and . BIBM, page 58-63. IEEE, (2021)Limited Dictionary Builder: An approach to select representative tokens for malicious URLs detection., , , , and . ICC, page 7077-7082. IEEE, (2015)Composite Interpolation-Based Multiscale Fuzzy Entropy and Its Application to Fault Diagnosis of Rolling Bearing., , , , and . Entropy, 21 (3): 292 (2019)DomainObserver: A Lightweight Solution for Detecting Malicious Domains Based on Dynamic Time Warping., , , , and . ICCS (1), volume 10860 of Lecture Notes in Computer Science, page 208-220. Springer, (2018)MalFilter: A Lightweight Real-Time Malicious URL Filtering System in Large-Scale Networks., , , , , and . ISPA/IUCC/BDCloud/SocialCom/SustainCom, page 565-571. IEEE, (2018)Simulation and Evaluation of CAVs Behavior in an Isolated Signalized Intersection Equipped with Dynamic Wireless Power Transfer System., , , , , , and . ITSC, page 2207-2212. IEEE, (2019)