共 22 条
- [2] Salvage the files you lost from your hard drive [J]. PC World (San Francisco, CA), 2005, 23 (05):
- [3] On Learning Hierarchical Embeddings from Encrypted Network Traffic [J]. PROCEEDINGS OF THE IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2022, 2022,
- [6] Revealing QoE of Web Users from Encrypted Network Traffic [J]. 2020 IFIP NETWORKING CONFERENCE AND WORKSHOPS (NETWORKING), 2020, : 28 - 36
- [7] I Know What You Did On Your Smartphone: Inferring App Usage Over Encrypted Data Traffic [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 433 - 441
- [8] Is the Uplink Enough? Estimating Video Stalls from Encrypted Network Traffic [J]. NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,
- [9] AppScanner: Automatic Fingerprinting of Smartphone Apps From Encrypted Network Traffic [J]. 1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 439 - 454
- [10] I still See You! Inferring Fitness Data from Encrypted Traffic of Wearables [J]. HEALTHINF: PROCEEDINGS OF THE 14TH INTERNATIONAL JOINT CONFERENCE ON BIOMEDICAL ENGINEERING SYSTEMS AND TECHNOLOGIES - VOL. 5: HEALTHINF, 2021, : 369 - 376