Can LLMs Deeply Detect Complex Malicious Queries? A Framework for Jailbreaking via Obfuscating Intent.
CoRR, 2024
EthGAN: Improving Ethereum Account Classification Accuracy via Data Augmentation.
Proceedings of the International Joint Conference on Neural Networks, 2024
IntentObfuscator: A Jailbreaking Method via Confusing LLM with Prompts.
Proceedings of the Computer Security - ESORICS 2024, 2024
Encrypted traffic classification based on Gaussian mixture models and Hidden Markov Models.
J. Netw. Comput. Appl., 2020
A privacy preserved and credible network protocol.
J. Parallel Distributed Comput., 2019
An Invisible Flow Watermarking for Traffic Tracking: A Hidden Markov Model Approach.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
A New Bitcoin Address Association Method Using a Two-Level Learner Model.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Encrypted Traffic Classification with a Convolutional Long Short-Term Memory Neural Network.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018
Meek-Based Tor Traffic Identification with Hidden Markov Model.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018
Performance Evaluation and Analysis of the Virtual Networks Built by Different Virtual Machine Managers.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
Performance Investigation and Comparison between Virtual Networks and Physical Networks Based on an Advanced Testbed Network.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
On the Prevention of Invalid Route Injection Attack.
Proceedings of the Intelligent Information Processing VII, 2014