Author of the publication

Vulnerability Detection Using Deep Learning Based Function Classification.

, , , , and . NSS, volume 13787 of Lecture Notes in Computer Science, page 3-22. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services., , , , , , and . IEEE Trans. Mob. Comput., 22 (6): 3287-3302 (June 2023)PAPU: Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs., , , , , , , and . IEEE Internet Things J., 7 (12): 11789-11802 (2020)Pancreas segmentation in CT based on RC-3DUNet with SOM., , , , , , , , and . Multim. Syst., 30 (2): 66 (April 2024)A Secure and Robust Knowledge Transfer Framework via Stratified-Causality Distribution Adjustment in Intelligent Collaborative Services., , , , and . IEEE Trans. Computers, 73 (1): 58-72 (January 2024)VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples., , , , and . ESORICS (2), volume 10493 of Lecture Notes in Computer Science, page 229-246. Springer, (2017)An Event-Based User Experience Evaluation Method for Virtual Reality Applications., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 767-774. IEEE, (2019)EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry., , , , , and . CoRR, (2022)KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications., , , , and . DSN, page 488-500. IEEE, (2022)Vulnerability Detection Using Deep Learning Based Function Classification., , , , and . NSS, volume 13787 of Lecture Notes in Computer Science, page 3-22. Springer, (2022)Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords., , , , and . USENIX Security Symposium, page 983-1000. USENIX Association, (2023)