From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

G-Fuzz: A Directed Fuzzing Framework for gVisor., , , , , , , , и . IEEE Trans. Dependable Secur. Comput., 21 (1): 168-185 (января 2024)Classification of Malware Variant Based on Ensemble Learning., , , , , , и . ML4CS (1), том 12486 из Lecture Notes in Computer Science, стр. 125-139. Springer, (2020)Binary File's Visualization and Entropy Features Analysis Combined with Multiple Deep Learning Networks for Malware Classification., , , , , и . Secur. Commun. Networks, (2020)A Lightweight Cross-Version Binary Code Similarity Detection Based on Similarity and Correlation Coefficient Features., , , , , , , , и . IEEE Access, (2020)Multiparty verification in image secret sharing., , , , и . Inf. Sci., (2021)Secure User Authentication Leveraging Keystroke Dynamics via Wi-Fi Sensing., , , , , , , и . IEEE Trans. Ind. Informatics, 18 (4): 2784-2795 (2022)AlphaEXP: An Expert System for Identifying Security-Sensitive Kernel Objects., , , , , , , , и . USENIX Security Symposium, стр. 4229-4246. USENIX Association, (2023)File Entropy Signal Analysis Combined With Wavelet Decomposition for Malware Classification., , , , , и . IEEE Access, (2020)DISOV: Discovering Second-Order Vulnerabilities Based on Web Application Property Graph., , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 106 (2): 133-145 (февраля 2023)Optir-SBERT: Cross-Architecture Binary Code Similarity Detection Based on Optimized LLVM IR., , , , и . ICDF2C (2), том 571 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 95-113. Springer, (2023)