From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security reinforcement for Ethereum virtual machine., , , , , , и . Inf. Process. Manag., 58 (4): 102565 (2021)Towards Better Semantics Exploration for Browser Fuzzing., , , , , , , , и . Proc. ACM Program. Lang., 7 (OOPSLA2): 604-631 (октября 2023)Corner detection based on shearlet transform and multi-directional structure tensor., , , и . Pattern Recognit., (2020)Robust and Efficient Corner Detection for Computer Vision.. University of New South Wales, Sydney, Australia, (2022)base-search.net (ftunswworks:oai:unsworks.library.unsw.edu.au:1959.4/100035).Premise Selection for Theorem Proving by Deep Graph Embedding., , , и . NIPS, стр. 2786-2796. (2017)Minerva: browser API fuzzing with dynamic mod-ref analysis., , , , , , , и . ESEC/SIGSOFT FSE, стр. 1135-1147. ACM, (2022)Limits of I/O Based Ransomware Detection: An Imitation Based Attack., , , , , , , и . SP, стр. 2584-2601. IEEE, (2023)Odin: on-demand instrumentation with on-the-fly recompilation., , , , , и . PLDI, стр. 1010-1024. ACM, (2022)Palmprint verification based on 2D - Gabor wavelet and pulse-coupled neural network., , и . Knowl. Based Syst., (2012)Optimized data storage algorithm of IoT based on cloud computing in distributed system., и . Comput. Commun., (2020)