Author of the publication

The New Progress in the Research of Binary Vulnerability Analysis.

, , , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 265-276. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Congestion Control Mechanism for Data Center Networks Based on Named Data Networking., , , , and . CFI, page 6:1-6:6. ACM, (2018)Category-Embodied Knowledge Embedding., , , , , and . ICONIP (3), volume 11303 of Lecture Notes in Computer Science, page 28-37. Springer, (2018)A Sorting Method: BWMSort II in Interval Type-2 Fuzzy Environment., , and . FUZZ-IEEE, page 1-6. IEEE, (2019)C-LGV: A novel cooperative caching scheme for P2P caches., , , , and . ICC, page 3012-3017. IEEE, (2013)A New Quantitative Evaluation Method for Fuzzing., , , , , , and . ICAIS (2), volume 11633 of Lecture Notes in Computer Science, page 181-190. Springer, (2019)Effective algorithms of the Moore-Penrose inverse matrices for extreme learning machine., , , and . Intell. Data Anal., 19 (4): 743-760 (2015)Thickness retrieval of dried dielectric layer in Lop Nur lake basin with PolInSAR data., , and . IGARSS, page 2750-2753. IEEE, (2014)Near-ultraviolet Spectroscopy of Star-forming Galaxies from eBOSS: Signatures of Ubiquitous Galactic-scale Outflows, , , , , , , , , and . (2015)cite arxiv:1507.07979Comment: 32 pages, 28 figures, 2 tables. Submitted to ApJ. Comments are most welcome.Bidirectional Cache for P2P Traffic in WLAN., , , , , and . PDCAT, page 638-641. IEEE, (2012)A multiobjective discrete bat algorithm for community detection in dynamic networks., , and . Appl. Intell., 48 (9): 3081-3093 (2018)