Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Static Detection of File Access Control Vulnerabilities on Windows System., , , , , and . Concurr. Comput. Pract. Exp., (2022)Memory access integrity: detecting fine-grained memory access errors in binary code., , , , , , , and . Cybersecur., 2 (1): 17 (2019)Using hybrid process simulation to evaluate manufacturing system component choices: integrating a virtual robot with the physical system., , , and . WSC, page 2827-2838. IEEE, (2011)Channel Characterization and Link Quality Assessment of IEEE 802.15.4-Compliant Radio for Factory Environments., , , and . IEEE Trans. Ind. Informatics, 3 (2): 99-110 (2007)Efficient Filter Algorithms for Reverse k-Nearest Neighbor Query., , , and . WAIM, volume 6897 of Lecture Notes in Computer Science, page 18-30. Springer, (2011)COMRace: Detecting Data Race Vulnerabilities in COM Objects., , , , , , and . USENIX Security Symposium, page 3019-3036. USENIX Association, (2022)3D Medical Model Automatic Annotation and Retrieval Using LDA Based on Semantic Features., , and . HIS, volume 10038 of Lecture Notes in Computer Science, page 91-101. (2016)3D Model Inpainting Based on 3D Deep Convolutional Generative Adversarial Network., , and . IEEE Access, (2020)Virtual Launch & Validation of Manufacturing Automation Controls., , , and . CASE, page 412-419. IEEE, (2010)Hardware-In-The-Loop for Manufacturing Automation Control: Current Status and Identified Needs., , , and . CASE, page 1105-1110. IEEE, (2007)