Guangdong, China

Jiaxu Xing

USPTO Granted Patents = 1 

Average Co-Inventor Count = 13.0

ph-index = 1


Company Filing History:


Years Active: 2025

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Innovations of Jiaxu Xing in Encrypted Traffic Classification

Introduction

Jiaxu Xing is an accomplished inventor based in Guangdong, China. He has made significant contributions to the field of network security, particularly in the classification of encrypted traffic. His innovative approach utilizes machine learning to enhance the identification of normal and malicious traffic.

Latest Patents

Jiaxu Xing holds a patent for a "System for classifying encrypted traffic based on data packet." This system comprises a traffic capture module, a traffic analysis module, and a traffic classification module. It collects data packets from network flows to construct a machine learning model, enabling the classification of encrypted traffic. The system effectively distinguishes between normal and malicious traffic by obtaining various features, including basic spatial-temporal features, header features, load features, and statistical features. Additionally, it focuses on differences between various versions of encryption protocols, particularly the transport layer security (TLS) protocol, to improve classification efficiency.

Career Highlights

Jiaxu Xing is affiliated with Guangzhou University, where he continues to advance his research in network security and machine learning. His work has garnered attention for its practical applications in enhancing cybersecurity measures.

Collaborations

Jiaxu has collaborated with notable colleagues, including Jing Qiu and Jie Ding, to further his research and development efforts in the field.

Conclusion

Jiaxu Xing's innovative contributions to encrypted traffic classification demonstrate his expertise and commitment to improving network security. His work not only enhances the understanding of encrypted traffic but also provides practical solutions for identifying potential threats.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…