X
Xin Wang
Researcher at National University of Defense Technology
Publications - 8
Citations - 93
Xin Wang is an academic researcher from National University of Defense Technology. The author has contributed to research in topics: Encryption & MIMO. The author has an hindex of 3, co-authored 8 publications receiving 31 citations.
Papers
More filters
Journal ArticleDOI
Real Network Traffic Collection and Deep Learning for Mobile App Identification
Xin Wang,Shuhui Chen,Jinshu Su +2 more
TL;DR: A framework for real network traffic collection and labeling in a scalable way is proposed and three of the most representative deep learning models and design are introduced and evaluated, namely, a SDAE, a 1D CNN, and a bidirectional LSTM network, respectively.
Proceedings ArticleDOI
App-Net: A Hybrid Neural Network for Encrypted Mobile Traffic Classification
Xin Wang,Shuhui Chen,Jinshu Su +2 more
TL;DR: This paper proposes App-Net, an end-to-end hybrid neural network, to learn effective features from raw TLS flows for mobile app identification and shows that the method can achieve an excellent performance and outperform the state-of-the-art methods.
Journal ArticleDOI
Automatic Mobile App Identification From Encrypted Traffic With Hybrid Neural Networks
Xin Wang,Shuhui Chen,Jinshu Su +2 more
TL;DR: App-Net is an end-to-end hybrid neural network for mobile app identification from encrypted TLS traffic that is designed by combining RNN and CNN in a parallel way and can automatically learn effective features from raw TLS flows.
Journal ArticleDOI
Low-Complexity Group Alternate Iterative List Detection for MIMO Systems
TL;DR: The numerical results demonstrate that the GAIL algorithm can achieve close-to-optimal performance while maintaining low computational complexity and the running speed can be dramatically increased using parallel processing in real-time communication systems.
Journal ArticleDOI
Secure Communications for Two-Way Relay Networks Via Relay Chatting
TL;DR: It can be found that the proposed scheme with relay chatting does not require the knowledge of the eavesdropper’s channel, and outperforms the joint relay and jammer selection scheme, which introduces the interference into the sources.