2 code implementations • 16 Feb 2021 • Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang
Stealing attack against controlled information, along with the increasing number of information leakage incidents, has become an emerging cyber security threat in recent years.
no code implementations • 24 Apr 2018 • Yuantian Miao, Zichan Ruan, Lei Pan, Yu Wang, Jun Zhang, Yang Xiang
Network traffic analytics technology is a cornerstone for cyber security systems.
Cryptography and Security