Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Adriel Cheng"'
Autor:
Yi Huang, Ying Li, Guillaume Jourjon, Suranga Seneviratne, Kanchana Thilakarathna, Adriel Cheng, Darren Webb, Richard Yi Da Xu
Publikováno v:
Pattern Recognition Letters. 169:50-57
Autor:
Adriel Cheng, Kyle Millar
Publikováno v:
2022 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE).
Autor:
Ying Li, Yi Huang, Suranga Seneviratne, Kanchana Thilakarathna, Adriel Cheng, Guillaume Jourjon, Darren Webb, David B. Smith, Richard Yi Da Xu
The vast majority of Internet traffic is now end-to-end encrypted, and while encryption provides user privacy and security, it has made network surveillance an impossible task. Various parties are using this limitation to distribute problematic conte
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::dddd9ca155e0d44a404b4af7727c507a
https://hdl.handle.net/10453/169462
https://hdl.handle.net/10453/169462
Autor:
Yi Huang, Ying Li, Timothy Heyes, Guillaume Jourjon, Adriel Cheng, Suranga Seneviratne, Kanchana Thilakarathna, Darren Webb, Richard Yi Da Xu
Existing deep learning approaches have achieved high performance in encrypted network traffic analysis tasks. However, practical requirements such as open-set recognition on dynamically changing tasks (e.g., changes in the target website list), chall
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b664c4fbc531db8186c1c2504978e60d
https://hdl.handle.net/10453/168095
https://hdl.handle.net/10453/168095
Publikováno v:
2021 International Conference on Machine Learning and Cybernetics (ICMLC).
Publikováno v:
2021 International Conference on Machine Learning and Cybernetics (ICMLC).
Publikováno v:
NOMS
Device management in large networks is of growing importance to network administrators and security analysts alike. The composition of devices on a network can help forecast future traffic demand as well as identify devices that may pose a security r
Autor:
Adriel Cheng
Publikováno v:
2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
Generative adversarial networks (GANs) have proven extremely successful in creating artificial yet highly realistic media data such as images, text, audio and videos. In this paper, we adapt and describe a GAN method for creating network traffic data
Publikováno v:
Deep Learning Applications for Cyber Security ISBN: 9783030130565
As the reliance on the Internet and its constituent applications increase, so too does the value in exploiting these networking systems. Methods to detect and mitigate these threats can no longer rely on singular facets of information, they must be a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::039507326a48bed378e130f6b28ded99
https://doi.org/10.1007/978-3-030-13057-2_5
https://doi.org/10.1007/978-3-030-13057-2_5
Autor:
Richard Yi Da Xu, Ying Li, Guillaume Jourjon, Adriel Cheng, Darren Webb, Yi Huang, Suranga Seneviratne, Kanchana Thilakarathna
Publikováno v:
NCA
© 2018 IEEE. The proliferation of smart devices has led to an exponential growth in digital media consumption, especially mobile video for content marketing. The vast majority of the associated Internet traffic is now end-to-end encrypted, and while