Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Function-Oriented Programming: A New Class of Code Reuse Attack in C Applications., , and . CNS, page 1-9. IEEE, (2018)Predicting user interests from contextual information., , and . SIGIR, page 363-370. ACM, (2009)Navel Gazing or the Long View?: The Influence of Firm Positioning with Respect to OSS Communities on a Developer's Firm Embeddedness., , and . AMCIS, Association for Information Systems, (2023)Twine Stack: A Hybrid Mechanism Achieving Less Cost for Return Address Protection., , and . ATS, page 7-12. IEEE, (2021)PointerChecker: Tag-Based and Hardware-Assisted Memory Safety against Memory Corruption., , and . ATS, page 96-101. IEEE, (2022)Inductive Vulnerability Detection via Gated Graph Neural Network., , , , , and . CSCWD, page 519-524. IEEE, (2022)IoT-Enabled Fault Prediction and Maintenance for Smart Charging Piles., , , and . IEEE Internet Things J., 10 (23): 21061-21075 (December 2023)Importance-based system cost management and failure risk analysis for different phases in life cycle., , and . Reliab. Eng. Syst. Saf., (February 2024)Understanding Cross National Difference in Knowledge Seeking Behavior Model: A Survival Perspective., , , and . ICIS, page 204. Association for Information Systems, (2009)Zipper Stack: Shadow Stacks Without Shadow., , , , , , and . ESORICS (1), volume 12308 of Lecture Notes in Computer Science, page 338-358. Springer, (2020)