scispace - formally typeset
X

Xin Wang

Researcher at National University of Defense Technology

Publications -  8
Citations -  93

Xin Wang is an academic researcher from National University of Defense Technology. The author has contributed to research in topics: Encryption & MIMO. The author has an hindex of 3, co-authored 8 publications receiving 31 citations.

Papers
More filters
Journal ArticleDOI

Real Network Traffic Collection and Deep Learning for Mobile App Identification

TL;DR: A framework for real network traffic collection and labeling in a scalable way is proposed and three of the most representative deep learning models and design are introduced and evaluated, namely, a SDAE, a 1D CNN, and a bidirectional LSTM network, respectively.
Proceedings ArticleDOI

App-Net: A Hybrid Neural Network for Encrypted Mobile Traffic Classification

TL;DR: This paper proposes App-Net, an end-to-end hybrid neural network, to learn effective features from raw TLS flows for mobile app identification and shows that the method can achieve an excellent performance and outperform the state-of-the-art methods.
Journal ArticleDOI

Automatic Mobile App Identification From Encrypted Traffic With Hybrid Neural Networks

TL;DR: App-Net is an end-to-end hybrid neural network for mobile app identification from encrypted TLS traffic that is designed by combining RNN and CNN in a parallel way and can automatically learn effective features from raw TLS flows.
Journal ArticleDOI

Low-Complexity Group Alternate Iterative List Detection for MIMO Systems

TL;DR: The numerical results demonstrate that the GAIL algorithm can achieve close-to-optimal performance while maintaining low computational complexity and the running speed can be dramatically increased using parallel processing in real-time communication systems.
Journal ArticleDOI

Secure Communications for Two-Way Relay Networks Via Relay Chatting

TL;DR: It can be found that the proposed scheme with relay chatting does not require the knowledge of the eavesdropper’s channel, and outperforms the joint relay and jammer selection scheme, which introduces the interference into the sources.