Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VSFBS: Vulnerability Search in Firmware Based on String., , , , , , , and . DSA, page 555-563. IEEE, (2020)Research on Abnormal Traffic Detection of Internet of Things Based on Feature Selection., , and . CNIOT, page 576-582. ACM, (2023)Beyond the Click: A First Look at the Role of a Microblogging Platform in the Web Ecosystem., , , , , , and . IEEE Trans. Network and Service Management, 16 (2): 743-754 (2019)A Heterogeneous High Speed Wireless Body Sensor Network Based on SC-UWB and ZIGBEE., , , , , and . GLOBECOM, page 1-5. IEEE, (2011)An Integrated Architecture for IoT Malware Analysis and Detection., , , , , , and . IoTaaS, volume 271 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 127-137. Springer, (2018)VSkLCG A Method for Cross-Platform Vulnerability Search in Firmware., , , , , , and . DSA, page 395-400. IEEE, (2019)Knowledge Enhanced GAN for IoT Traffic Generation., , , , , , and . WWW, page 3336-3346. ACM, (2022)IHB: A scalable and efficient scheme to identify homologous binaries in IoT firmwares., , , , , and . IPCCC, page 1-8. IEEE Computer Society, (2017)Grainflow: a per-bit customizable scheme for data plane innovation on programmable hardware., , , , and . StudentWorkshop@CoNEXT, page 13:1-13:2. ACM, (2011)Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement., , , , , , , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 603-612. Springer, (2022)