Jinlong Fei

Orcid: 0000-0001-8499-9402

According to our database1, Jinlong Fei authored at least 19 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Diverse Metrics for Robust LBS Privacy: Distance, Semantics, and Temporal Factors.
Sensors, February, 2024

2023
Meta-TFEN: A Multi-Modal Deep Learning Approach for Encrypted Malicious Traffic Detection.
Proceedings of the 33rd International Telecommunication Networks and Applications Conference, 2023

2022
Hidden service publishing flow homology comparison using profile-hidden markov model.
Int. J. Intell. Syst., 2022

An Abnormal Domain Name Generation Method Based on a Character-Level Model.
Proceedings of the 4th International Conference on Robotics, 2022

Pruned-F1DCN: A lightweight network model for traffic classification.
Proceedings of the 2022 International Conference on Cyber Security, 2022

2021
Deep Nearest Neighbor Website Fingerprinting Attack Technology.
Secur. Commun. Networks, 2021

Website Fingerprinting Attacks Based on Homology Analysis.
Secur. Commun. Networks, 2021

Hidden Service Circuit Reconstruction Attacks Based on Middle Node Traffic Analysis.
Int. J. Digit. Crime Forensics, 2021

2020
Enhancing network intrusion detection classifiers using supervised adversarial training.
J. Supercomput., 2020

Hidden Service Website Response Fingerprinting Attacks Based on Response Time Feature.
Secur. Commun. Networks, 2020

2018
A Domain Name Model of Anonymous Network Hidden Service.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks.
IEEE Access, 2017

2016
基于协同地址碰撞的隐蔽认证方法 (Cooperative Address Knocking Based Covert Authentication).
计算机科学, 2016

2015
Automatic Binary De-obfuscation Based Compiler Optimization.
Proceedings of the Advances in Swarm and Computational Intelligence, 2015

2014
High-Payload Image-Hiding Scheme Based on Best-Block Matching and Multi-layered Syndrome-Trellis Codes.
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014

A Method of Multiple Encryption and Sectional Encryption Protocol Reverse Engineering.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Method Based on GSCPN for Network Vulnerability Analysis.
J. Softw., 2013

An Efficient Proof of Retrievability Scheme for Fully Homomorphic Encrypted Data.
J. Networks, 2013

A Framework for Automated Security Proof and its Application to OAEP.
J. Networks, 2013


  Loading...