Shen, Guowei
594  results:
Search for persons X
?
 
?
 
?
4

USAGE : Uncertain flow graph and spatio-temporal graph conv..:

Wang, Kaixi ; Cui, Yunhe ; Qian, Qing...
Journal of Network and Computer Applications.  219 (2023)  - p. 103722 , 2023
 
?
7

SAD: Website Fingerprinting Defense Based on Adversarial Ex..:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Security and Privacy in New Computing Environments,
Tang, Renzhi ; Shen, Guowei ; Guo, Chun. - p. 88-102 , 2022
 
?
8

SAD: Website Fingerprinting Defense Based on Adversarial Ex..:

Tang, Renzhi ; Shen, Guowei ; Guo, Chun..
Security and Communication Networks.  2022 (2022)  - p. 1-12 , 2022
 
?
11

Towards DDoS detection mechanisms in Software-Defined Netwo..:

Cui, Yunhe ; Qian, Qing ; Guo, Chun...
Journal of Network and Computer Applications.  190 (2021)  - p. 103156 , 2021
 
?
12

2-SPIFF: a 2-stage packer identification method based on fu..:

Liu, Hao ; Guo, Chun ; Cui, Yunhe..
Applied Intelligence.  51 (2021)  12 - p. 9038-9053 , 2021
 
?
13

DIAMOND: A Structured Coevolution Feature Optimization Meth..:

Yin, Wencheng ; Cui, Yunhe ; Qian, Qing...
Wireless Communications and Mobile Computing.  2021 (2021)  1 - p. , 2021
 
?
14

The Named Entity Recognition of Chinese Cybersecurity Using..:

Xie, Bo ; Shen, Guowei ; Guo, Chun..
Wireless Communications and Mobile Computing.  2021 (2021)  1 - p. , 2021
 
?
15

METER: An Ensemble DWT-based Method for Identifying Low-rat..:

, In: 2021 IEEE 19th International Conference on Embedded and Ubiquitous Computing (EUC),
Wang, Cong ; Cui, Yunhe ; Qian, Qing... - p. 79-86 , 2021
 
1-15