Author of the publication

Optimization of program recursive function calls analysis method.

, , , , and . Automatic Control and Computer Sciences, 50 (4): 253-259 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Malicious Domains in APT via Mining Massive DNS Logs., , , , and . ML4CS (1), volume 12486 of Lecture Notes in Computer Science, page 140-152. Springer, (2020)Cross-Project Software Defect Prediction Based on Feature Selection and Transfer Learning., , and . ML4CS (3), volume 12488 of Lecture Notes in Computer Science, page 363-371. Springer, (2020)A Practical Method to Confine Sensitive API Invocations on Commodity Hardware., , , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 145-159. Springer, (2017)APTMalInsight: Identify and cognize APT malware based on system call information and ontology knowledge framework., , , , and . Inf. Sci., (2021)Bypassing software-based remote attestation using debug registers., , , , , , and . Connect. Sci., (2024)A Virtualization-Based Approach for Application Whitelisting., , , and . IEICE Trans. Inf. Syst., 97-D (6): 1648-1651 (2014)Defending Application Layer DDoS Attacks via Multidimensional Parallelotope., , , , , , and . Secur. Commun. Networks, (2020)The Acoustic System of the Fendouzhe HOV., , , , , , , , , and 1 other author(s). Sensors, 21 (22): 7478 (2021)Online Teaching of Computer Fundamentals Course During the Pandemic., , and . ICCSE (3), volume 1813 of Communications in Computer and Information Science, page 410-422. Springer, (2022)A Method of Fast Locating the Key Nodes Based on the Distribution Law of Node's Propagation Domain., , , , and . DSC, page 902-909. IEEE, (2018)