Cited By
View all- Peng WCui LCai WWang WCui XHao ZYun X(2025)Bottom Aggregating, Top Separating: An Aggregator and Separator Network for Encrypted Traffic UnderstandingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2025.352931620(1794-1806)Online publication date: 2025
- Rao BZhu GDing QChen DCao MCao YWang F(2025)A steganographic backdoor attack scheme on encrypted trafficPeer-to-Peer Networking and Applications10.1007/s12083-024-01893-718:2Online publication date: 17-Jan-2025
- Liu YJia JWu JAi JShen MZhu L(2025)Encrypted Malware Traffic Detection Via Time-Frequency Domain AnalysisAlgorithms and Architectures for Parallel Processing10.1007/978-981-96-1548-3_7(98-110)Online publication date: 17-Feb-2025
- Show More Cited By