Author of the publication

I2P Anonymous Communication Network Measurement and Analysis.

, , , , and . SmartCom, volume 11910 of Lecture Notes in Computer Science, page 105-115. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Mechanisms to Defend against New Attacks on Software-Defined Radio., , , , , , and . ICNC, page 537-541. IEEE Computer Society, (2018)Robust Feature Selection for IM Applications at Early Stage Traffic Classification Using Machine Learning Algorithms., , and . HPCC/SmartCity/DSS, page 239-245. IEEE Computer Society, (2017)An Efficient Security System for Mobile Data Monitoring., , , , , and . Wireless Communications and Mobile Computing, (2018)A Metadata-Based Representation Method of the Internet of Things., , , and . DSC, page 498-505. IEEE, (2018)WeChat Text and Picture Messages Service Flow Traffic Classification Using Machine Learning Technique., , , , , , and . HPCC/SmartCity/DSS, page 58-62. IEEE Computer Society, (2016)WeChat Text Messages Service Flow Traffic Classification Using Machine Learning Technique., , and . ICITCS, page 1-5. IEEE Computer Society, (2016)SuperEye: A Distributed Port Scanning System., , , , , and . ICAIS (4), volume 11635 of Lecture Notes in Computer Science, page 46-56. Springer, (2019)lpRide: Lightweight and Privacy-Preserving Ride Matching Over Road Networks in Online Ride Hailing Systems., , , , and . IEEE Trans. Vehicular Technology, 68 (11): 10418-10428 (2019)Deciding Your Own Anonymity: User-Oriented Node Selection in I2P., , , , , and . IEEE Access, (2018)A Survey on Network Traffic Identification., , , , and . ICAIS (4), volume 11635 of Lecture Notes in Computer Science, page 91-100. Springer, (2019)