Author of the publication

Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search.

, , , , , , and . CoRR, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collaborative 'many to many' DDoS detection in cloud., , and . Int. J. Ad Hoc Ubiquitous Comput., 23 (3/4): 192-202 (2016)EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts., , , and . SANER, page 116-126. IEEE, (2020)Are Android Apps Being Protected Well Against Attacks?, , and . IEEE Wirel. Commun., 27 (3): 66-71 (2020)SMARTSHIELD: Automatic Smart Contract Protection Made Easy., , , , , and . SANER, page 23-34. IEEE, (2020)PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication., , , , , and . IWQoS, page 1-10. IEEE, (2020)A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects., , , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Bio-physiological-signals-based VR cybersickness detection., , , and . CCF Trans. Pervasive Comput. Interact., 4 (3): 268-284 (2022)Covert Rate Maximization in Wireless Full-Duplex Relaying Systems With Power Control., , , , and . IEEE Trans. Commun., 69 (9): 6198-6212 (2021)Homomorphic Compression: Making Text Processing on Compression Unlimited., , , , , , , and . Proc. ACM Manag. Data, 1 (4): 271:1-271:28 (December 2023)Consensus-Clustering-Based Automatic Distribution Matching for Cross-Domain Image Steganalysis., , , , and . IEEE Trans. Knowl. Data Eng., 35 (6): 5665-5679 (June 2023)