Author of the publication

A Value Set Analysis Refinement Approach Based on Conditional Merging and Lazy Constraint Solving.

, , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ARM Static Library Identification Framework., , and . J. Softw., 5 (10): 1099-1106 (2010)DUEN: Dynamic ensemble handling class imbalance in network intrusion detection., , , , and . Expert Syst. Appl., 229 (Part A): 120420 (November 2023)Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps., , , and . IJDSN, (2019)基于热例程的动态二进制翻译优化 (Hot-routine Based Optimization of Dynamic Binary Translation)., , , , and . 计算机科学, 43 (5): 27-33 (2016)FA-Fuzz: A Novel Scheduling Scheme Using Firefly Algorithm for Mutation-Based Fuzzing., , , , , , and . IEEE Trans. Software Eng., 50 (1): 1-15 (January 2024)Ultra High Throughput Implementations for MD5 Hash Algorithm on FPGA., , , and . HPCA (China), volume 5938 of Lecture Notes in Computer Science, page 433-441. Springer, (2009)A Multi-level Perception Security Model Using Virtualization., , , and . KSII Trans. Internet Inf. Syst., 12 (11): 5588-5613 (2018)An Effective Usage and Access Control Scheme for Preventing Permission Leak in a Trusted Execution Environment., , , , and . ICCNS, page 6-10. ACM, (2016)Determining the base address of MIPS firmware based on absolute address statistics and string reference matching., , , and . Comput. Secur., (2020)Multiclass Classification-Based Side-Channel Hybrid Attacks on Strong PUFs., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)