From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Deep Learning Approach to Discover Router Firmware Vulnerabilities., , , , и . IEEE Trans. Ind. Informatics, 20 (1): 691-702 (января 2024)Convergence of IoT and Cognitive Radio Networks: A Survey of Applications, Techniques, and Challenges., , , , и . IEEE Access, (2023)Comparison of Spectrum Management without Game Theory (SMWG) and with Game Theory (SMG) for Network Performance in Cognitive Radio Network., , , , и . BWCCA, стр. 348-355. IEEE, (2012)A game theoretic approach to power trading in cognitive radio systems., , , , и . SoftCOM, стр. 1-5. IEEE, (2012)AI Techniques for Software Vulnerability Detection and Mitigation., , , , , и . DSC, стр. 1-10. IEEE, (2023)AI in Education: Improving Quality for Both Centralized and Decentralized Frameworks., , , , и . EDUCON, стр. 1-6. IEEE, (2023)FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries., , , и . ACM Trans. Priv. Secur., 21 (2): 8:1-8:34 (2018)BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning., , , и . ESORICS (2), том 11736 из Lecture Notes in Computer Science, стр. 47-67. Springer, (2019)DySign: Dynamic Fingerprinting for the Automatic Detection of Android Malware., , , и . CoRR, (2017)A stratified approach to function fingerprinting in program binaries using diverse features.. Expert Syst. Appl., (2022)