From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Some Results on the Improved Bound and Construction of Optimal $(r, \ \delta)$ LRCs., , , , , и . ICCC, стр. 365-370. IEEE, (2022)RENN: Efficient Reverse Execution with Neural-Network-Assisted Alias Analysis., , , , , , , и . ASE, стр. 924-935. IEEE, (2019)A Systematic Study of Elastic Objects in Kernel Exploitation., , и . CCS, стр. 1165-1184. ACM, (2020)An In-depth Analysis of Duplicated Linux Kernel Bug Reports., , , , , , и . NDSS, The Internet Society, (2022)PET: Prevent Discovered Errors from Being Triggered in the Linux Kernel., , и . USENIX Security Symposium, стр. 4193-4210. USENIX Association, (2023)FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities., , , , , и . USENIX Security Symposium, стр. 781-797. USENIX Association, (2018)GREBE: Unveiling Exploitation Potential for Linux Kernel Bugs., , , , , , и . SP, стр. 2078-2095. IEEE, (2022)A New Oversampling Method Based on Triangulation of Sample Space., , , , и . IEEE Trans. Syst. Man Cybern. Syst., 54 (2): 774-786 (февраля 2024)Towards the Detection of Inconsistencies in Public Security Vulnerability Reports., , , , , и . USENIX Security Symposium, стр. 869-885. USENIX Association, (2019)KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities., , , и . USENIX Security Symposium, стр. 1187-1204. USENIX Association, (2019)