Author of the publication

Staged Method of Code Similarity Analysis for Firmware Vulnerability Detection.

, , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new access control method for semantic web services based on security control center., , and . ICNC, page 3711-3714. IEEE, (2010)A Privacy Filtering and Processing Model in Cloud Computing., , , and . ISCID (1), page 182-187. IEEE, (2016)Application of Mobile Cloud Computing in Operational Command Training Simulation System., , and . CIT, page 532-535. IEEE Computer Society, (2012)SO-RTI: A new RTI based on web services., , , and . ICAL, page 321-326. IEEE, (2012)RFID technology in victory judgement of military exercises., , , and . ICAL, page 390-394. IEEE, (2012)An ArcObjects-based approach to rapid application development of GIS., , and . ICAL, page 411-414. IEEE, (2012)Staged Method of Code Similarity Analysis for Firmware Vulnerability Detection., , , and . IEEE Access, (2019)云计算环境下隐私数据的隐式攻击保护 (Privacy Protection from Implicit Attacks in Cloud Computing Environment)., , , and . 计算机科学, 43 (9): 184-187 (2016)Standard Model Establishment of TCM Syndrome Differentiation of Type 2 Diabetes Based on Data-Mining., , , and . ISDA, page 747-754. IEEE Computer Society, (2007)A Survey on Side-Channel Attacks of Strong PUF., , , and . ICAIS (2), volume 12240 of Lecture Notes in Computer Science, page 74-85. Springer, (2020)