Author of the publication

Software Vulnerability Detection Using Backward Trace Analysis and Symbolic Execution.

, , , and . ARES, page 446-454. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intelligent Recognition of Coastal Outfall Drainage Based on Sentinel-2/MSI Imagery., , , , , and . Remote. Sens., 16 (2): 423 (January 2024)Transfer Learning with Random Coefficient Ridge Regression., and . CoRR, (2023)Transfer Learning for Contextual Multi-armed Bandits., , and . CoRR, (2022)A Markov random field model for network-based analysis of genomic data., and . Bioinform., 23 (12): 1537-1544 (2007)MiRKAT: kernel machine regression-based global association tests for the microbiome., , , , , , , , and . Bioinform., 37 (11): 1595-1597 (2021)Software Vulnerability Detection Using Backward Trace Analysis and Symbolic Execution., , , and . ARES, page 446-454. IEEE Computer Society, (2013)Entropy analysis to classify unknown packing algorithms for malware detection., , , , and . Int. J. Inf. Sec., 16 (3): 227-248 (2017)Inertial space tracking for free-floating space robot manipulator using RBF-NN based compensating control algorithm., , and . ROBIO, page 756-760. IEEE, (2011)A two-part mixed-effects model for analyzing longitudinal microbiome compositional data., and . Bioinform., 32 (17): 2611-2617 (2016)Group SCAD regression analysis for microarray time course gene expression data., , and . Bioinform., 23 (12): 1486-1494 (2007)