Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Repair of Semantic Defects Using Restraint Mechanisms., , , , , , and . Symmetry, 12 (9): 1563 (2020)A Method of Malicious Bot Traffic Detection., , , and . CSS (2), volume 11983 of Lecture Notes in Computer Science, page 67-76. Springer, (2019)Revealing and Analyzing the Visual Scams of Cryptocurrency Wallets., , , and . ACM TUR-C, page 148-149. ACM, (2023)How and when voluntary citizenship behaviour towards individuals triggers vicious knowledge hiding: the roles of moral licensing and the mastery climate., , , , and . J. Knowl. Manag., 27 (8): 2162-2193 (2023)Automatic Repair of Semantic Defects Using Restraint Mechanisms., , , , , , , and . FCS, volume 1286 of Communications in Computer and Information Science, page 567-583. Springer, (2020)Stress Analysis of Osteoporotic Lumbar Vertebra Using Finite Element Model with Microscaled Beam-Shell Trabecular-Cortical Structure., , and . J. Appl. Math., (2013)Priority Measurement of Patches for Program Repair Based on Semantic Distance., , , , , and . Symmetry, 12 (12): 2102 (2020)On Designing the Event-Triggered Multistep Model Predictive Control for Nonlinear System Over Networks With Packet Dropouts and Cyber Attacks., , , and . IEEE Trans. Cybern., 52 (10): 11200-11212 (2022)Automated Program-Semantic Defect Repair and False-Positive Elimination without Side Effects., , , , , , and . Symmetry, 12 (12): 2076 (2020)Understanding and Detecting Abused Image Hosting Modules as Malicious Services., , , , , and . CCS, page 3213-3227. ACM, (2023)