Cao, Jiahao
54  results:
Search for persons X
?
1

Feature extraction method of rolling bearing fault based on..:

, In: 2024 IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications (CIVEMSA),
 
?
2

RoLL: Real-Time and Accurate Route Leak Location with AS Tr..:

, In: ICC 2023 - IEEE International Conference on Communications,
Li, Jiang ; Cao, Jiahao ; Meng, Zili.. - p. 5240-5246 , 2023
 
?
3

Rosetta: Enabling Robust TLS Encrypted Traffic Classificati..:

, In: Proceedings of the ACM Turing Award Celebration Conference - China 2023,
Xie, Renjie ; Wang, Yixiao ; Cao, Jiahao... - p. 131-132 , 2023
 
?
4

Auter: Automatically Tuning Multi-layer Network Buffers in ..:

, In: IEEE INFOCOM 2022 - IEEE Conference on Computer Communications,
He, Xu ; Cao, Jiahao ; Wang, Shu... - p. 1689-1698 , 2022
 
?
5

Less is More: Mitigating Tor Traffic Correlation with Dista..:

, In: 2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys),
Zhang, Guoqiang ; Cao, Jiahao ; Xu, Mingwei. - p. 538-545 , 2022
 
?
6

SysCap: Profiling and Crosschecking Syscall and Capability ..:

, In: 2022 IEEE Conference on Communications and Network Security (CNS),
Xing, Yunlong ; Cao, Jiahao ; Wang, Xinda... - p. 236-244 , 2022
 
?
7

Prompt as a Knowledge Probe for Chinese Spelling Check:

, In: Knowledge Science, Engineering and Management; Lecture Notes in Computer Science,
Peng, Kun ; Sun, Nannan ; Cao, Jiahao... - p. 516-527 , 2022
 
?
8

Aspect Feature Distillation and Enhancement Network for Asp..:

, In: Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval,
Liu, Rui ; Cao, Jiahao ; Sun, Nannan. - p. 1577-1587 , 2022
 
?
9

Consistency is All I Ask: Attacks and Countermeasures on th..:

, In: Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science,
Liu, Songsong ; Feng, Pengbin ; Cao, Jiahao... - p. 197-217 , 2022
 
?
10

Try before You Buy: Privacy-preserving Data Evaluation on C..:

, In: Annual Computer Security Applications Conference,
Song, Qiyang ; Cao, Jiahao ; Sun, Kun.. - p. 260-272 , 2021
 
?
11

From One-hot Encoding to Privacy-preserving Synthetic Elect..:

, In: Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies,
Xiang, Xiayu ; Duan, Shaoming ; Pan, Hezhong... - p. 407-413 , 2020
 
?
12

When the Differences in Frequency Domain are Compensated: U..:

, In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security,
Wang, Shu ; Cao, Jiahao ; He, Xu.. - p. 1103-1119 , 2020
 
?
13

cSFC: Building Credible Service Function Chain on the Cloud:

, In: 2019 IEEE Global Communications Conference (GLOBECOM),
Yao, Shengsheng ; Xu, Mingwei ; Li, Qi.. - p. 1-6 , 2019
 
?
14

Covert Channels in SDN: Leaking Out Information from Contro..:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Security and Privacy in Communication Networks,
Cao, Jiahao ; Sun, Kun ; Li, Qi... - p. 429-449 , 2019
 
?
15

TSA: A Two-Phase Scheme Against Amplification DDoS Attack i..:

, In: Communications in Computer and Information Science; Mobile Ad-hoc and Sensor Networks,
Liu, Zheng ; Xu, Mingwei ; Cao, Jiahao. - p. 483-496 , 2018
 
1-15