Author of the publication

A New Quantitative Evaluation Method for Fuzzing.

, , , , , , and . ICAIS (2), volume 11633 of Lecture Notes in Computer Science, page 181-190. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on the Rules of Electronic Evidence in Chinese Criminal Proceedings., , and . Int. J. Digit. Crime Forensics, 12 (3): 111-121 (2020)A Proposed Three-Dimensional Public Security Prevention and Control System Based on Big-Data., , , , , and . SPIoT (1), volume 1282 of Advances in Intelligent Systems and Computing, page 320-325. Springer, (2020)Suggestions to digital forensics in Cloud computing ERA., , , and . IC-NIDC, page 540-544. IEEE, (2012)An Incremental Acquisition Method for Web Forensics., , , and . Int. J. Digit. Crime Forensics, 13 (6): 1-13 (2021)LIPPS: Logistics Information Privacy Protection System Based on Encrypted QR Code., , , , and . Trustcom/BigDataSE/ISPA, page 996-1000. IEEE, (2016)Reliable Security Strategy for Message-Oriented Middleware., , , and . Int. J. Digit. Crime Forensics, 10 (1): 12-23 (2018)A New Quantitative Evaluation Method for Fuzzing., , , , , , and . ICAIS (2), volume 11633 of Lecture Notes in Computer Science, page 181-190. Springer, (2019)Research on Threat Information Network Based on Link Prediction., , , , and . Int. J. Digit. Crime Forensics, 13 (2): 94-102 (2021)An Improved Encryption Scheme for Traitor Tracing from Lattice., , , and . Int. J. Digit. Crime Forensics, 10 (4): 21-35 (2018)