Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CodeDiff: A Malware Vulnerability Detection Tool Based on Binary File Similarity for Edge Computing Platform., , , , , , and . WASA (3), volume 13473 of Lecture Notes in Computer Science, page 507-528. Springer, (2022)EmuIoTNet: An Emulated IoT Network for Dynamic Analysis., , , , , and . ICICS (1), volume 12918 of Lecture Notes in Computer Science, page 224-240. Springer, (2021)MalPro: Learning on Process-Aware Behaviors for Malware Detection., , , , , , , , and . ISCC, page 1-7. IEEE, (2022)Chinese-keyword Fuzzy Search and Extraction over Encrypted Patent Documents., , and . KDIR, page 168-176. SciTePress, (2015)Modeling for Traffic Replay in Virtual Network., , , , and . HPCC/SmartCity/DSS, page 495-502. IEEE, (2018)An Ontology-Driven Knowledge Management System Used in the Patent Library., , and . KMIS, page 248-253. SciTePress, (2015)A Cache-Aware Virtual Machine Placement With Network Constraints in Large-Scale Network Emulation., , , , , , , and . HPCC/DSS/SmartCity/DependSys, page 285-294. IEEE, (2022)An Enhanced Vulnerability Detection in Software Using a Heterogeneous Encoding Ensemble., , , , , and . ISCC, page 1214-1220. IEEE, (2023)Surviving screen-off battery through out-of-band Wi-Fi coordination., , , , , , and . INFOCOM, page 1-9. IEEE, (2017)