Cited By
View all- Dong WYu JLin XGou GXiong G(2025)Deep learning and pre-training technology for encrypted traffic classification: A comprehensive reviewNeurocomputing10.1016/j.neucom.2024.128444617(128444)Online publication date: Feb-2025
- De Sutter BSchrittwieser SCoppens BKochberger P(2024)Evaluation Methodologies in Software Protection ResearchACM Computing Surveys10.1145/3702314Online publication date: 2-Nov-2024
- Xie ZWen MLi TZhu YHou QJin HFilkov VRay BZhou M(2024)How Does Code Optimization Impact Third-party Library Detection for Android Applications?Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695554(1919-1931)Online publication date: 27-Oct-2024
- Show More Cited By