From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Bidirectional LSTM: An Innovative Approach for Phishing URL Identification., , и . IMIS, том 994 из Advances in Intelligent Systems and Computing, стр. 326-337. Springer, (2019)Code Syntax-Comparison Algorithm Based on Type-Redefinition-Preprocessing and Rehash Classification., , , , , и . J. Multim., 6 (4): 320-328 (2011)Enhanced Secure ZigBee Light Link Protocol Based on Network Key Update Mechanism., , и . IMIS, том 773 из Advances in Intelligent Systems and Computing, стр. 343-353. Springer, (2018)Detecting Malware Based on Opcode N-Gram and Machine Learning., , и . 3PGCIC, том 13 из Lecture Notes on Data Engineering and Communications Technologies, стр. 99-110. Springer, (2017)A program behavior recognition algorithm based on assembly instruction sequence similarity., , , и . BWCCA, том 2 из Lecture Notes on Data Engineering and Communications Technologies, стр. 13-20. Springer, (2016)The Study and Realization of Browser Defect Detection Technology Based on Intelligent Boundary Reverse., , и . IMIS, том 612 из Advances in Intelligent Systems and Computing, стр. 296-309. Springer, (2017)An Enhancement for Key Management in LTE/SAE X2 Handover Based on Ciphering Key Parameters., , , и . 3PGCIC, стр. 256-261. IEEE Computer Society, (2014)Sentence Similarity Based on Semantic Vector Model., , и . 3PGCIC, стр. 499-503. IEEE Computer Society, (2014)ADDFuzzer: A New Fuzzing Framework of Android Device Drivers., , и . BWCCA, стр. 88-91. IEEE Computer Society, (2015)Simulation-Based Fuzzing for Smart IoT Devices., , , , , и . IMIS, том 279 из Lecture Notes in Networks and Systems, стр. 304-313. Springer, (2021)