| Co-Authors | |
|---|---|
| Authors | No. of Publications |
| chen, kai | 6 |
| wang, xiao feng | 6 |
| tang, di | 5 |
| zou, wei | 5 |
| tang, haixu | 4 |
| wang, xiaofeng | 4 |
| liu, xiaozhong | 3 |
| xu, dandan | 3 |
| yao, yepeng | 3 |
| zha, mingming | 3 |
| feng, xuan | 2 |
| lee, yeonjoon | 2 |
| liao, xiaojing | 2 |
| liu, baoxu | 2 |
| yuan, kan | 2 |
| alowaisheq, eihal | 1 |
| dou, yanzhi | 1 |
| li, longxing | 1 |
| lu, haoran | 1 |
| ma, bin | 1 |
| mi, xianghang | 1 |
| qin, yue | 1 |
| sun, menghan | 1 |
| suya, fnu | 1 |
| tang, siyuan | 1 |
| tian, yuan | 1 |
| wang, aohui | 1 |
| wang, peng | 1 |
| wang, xueqiang | 1 |
| xing, luyi | 1 |
| you, wei | 1 |
| yue, chang | 1 |
| zhang, kehuan | 1 |
| zhang, nan | 1 |
| zhang, yingjun | 1 |
| zhao, dongfang | 1 |
| zhao, qianqian | 1 |
| Keywords in Publications | |
|---|---|
| keywords | No. of Authors |
| 4g | 1 |
| adversarial-images | 1 |
| android | 1 |
| android application | 1 |
| android malware | 1 |
| attack | 1 |
| cellular network | 1 |
| content pollution | 1 |
| cybercrime | 1 |
| deep learning | 1 |
| deep-learning | 1 |
| documentation analysis | 1 |
| ip leak | 1 |
| isp | 1 |
| large scale | 1 |
| lte | 1 |
| machine learning | 1 |
| mobile security | 1 |
| nlp | 1 |
| p2p network | 1 |
| partial execution | 1 |
| peer-assisted delivery network | 1 |
| privacy | 1 |
| privacy-setting | 1 |
| security analysis | 1 |
| slicing | 1 |
| traffic signature | 1 |
| usability | 1 |
| vulnerability | 1 |
| webrtc | 1 |
