Cited By
View all- Li YLi JCao JXie RWang YXu MLuo BLiao XXu JKirda ELie D(2024)Poster: Few-Shot Inter-Domain Routing Threat Detection with Large-Scale Multi-Modal Pre-TrainingProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3691402(4970-4972)Online publication date: 2-Dec-2024
- Wu LLin NZhang KWu Y(2024)Modeling the BGP Prefix Hijack via Pollution and Recovery ProcessesBig Data and Social Computing10.1007/978-981-97-5803-6_15(253-265)Online publication date: 1-Aug-2024
- He JLi YZhang HWang MAn CWang J(2023)Be Careful of Your Neighbors: Injected Sub-Prefix Hijacking Invisible to Public MonitorsICC 2023 - IEEE International Conference on Communications10.1109/ICC45041.2023.10278923(3774-3780)Online publication date: 28-May-2023
- Show More Cited By