Wang, Chonghua
250  Ergebnisse:
Personensuche X
?
3

Application of Grey Prediction Model Based on Python in Car..:

, In: 2023 International Conference on Network, Multimedia and Information Technology (NMITCON),
Peng, Tao ; Sun, Yong ; Zheng, Yushan... - p. 1-6 , 2023
 
?
5

YUCML-An usage control policy language for end-to-end data ..:

, In: 2023 International Conference on Cyber-Physical Social Intelligence (ICCSI),
Li, Chao ; Li, Junjian ; Wang, Ruoyu.. - p. 350-355 , 2023
 
?
6

Network Traffic Classification Based on SD Sampling and Hie..:

Qin, Jian ; Han, Xueying ; Wang, Chonghua...
Security and Communication Networks.  2023 (2023)  - p. 1-16 , 2023
 
?
 
?
9

An Anomaly Detection Approach Based on Integrated LSTM for ..:

Li, Chao ; Fu, Yuhan ; Zhang, Rui...
Security and Communication Networks.  2023 (2023)  - p. 1-10 , 2023
 
?
10

IoV-SDCM: An IoV Secure Data Communication Model Based on N..:

Sun, Yan ; Yin, Lihua ; Ma, Ying..
Security and Communication Networks.  2022 (2022)  - p. 1-13 , 2022
 
?
12

MCFM: Discover Sensitive Behavior from Encrypted Traffic in..:

, In: 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
Zhu, Zhishen ; Shi, Junzheng ; Wang, Chonghua... - p. 897-904 , 2022
 
?
13

WREP: A lightweight event real-time processing engine for I..:

, In: 2022 7th IEEE International Conference on Data Science in Cyberspace (DSC),
Feng, Lei ; Zhang, Yuanfei ; Hao, Zhiqiang. - p. 79-85 , 2022
 
?
14

Anomaly Detection in Encrypted Identity Resolution Traffic ..:

, In: 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS),
Zhu, Zhishen ; Zhou, Hao ; Yang, Qingya.. - p. 264-275 , 2022
 
?
15

A virtualization-based security architecture for industrial..:

, In: 2022 7th IEEE International Conference on Data Science in Cyberspace (DSC),
Zhang, Yuqiang ; Hao, Zhiqiang ; Hu, Ning.. - p. 94-101 , 2022
 
1-15