From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

HoneyVP: A Cost-Effective Hybrid Honeypot Architecture for Industrial Control Systems., , , , и . ICC, стр. 1-6. IEEE, (2021)Remote Fingerprinting on Internet-Wide Printers Based on Neural Network., , , , и . GLOBECOM, стр. 1-6. IEEE, (2019)IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol., , , , , , и . ACNS, том 13269 из Lecture Notes in Computer Science, стр. 356-375. Springer, (2022)TaiE: Function Identification for Monolithic Firmware., , , , , и . ICPC, стр. 403-414. ACM, (2024)Concrete Constraint Guided Symbolic Execution., , , , и . ICSE, стр. 122:1-122:12. ACM, (2024)Finding Vulnerabilities in Internal-binary of Firmware with Clues., , , , , , и . ICC, стр. 5397-5402. IEEE, (2022)Physical layer spoofing detection based on sparse signal processing and fuzzy recognition., , , и . IET Signal Process., 11 (5): 640-646 (2017)Fuzzing proprietary protocols of programmable controllers to find vulnerabilities that affect physical control., , , , , и . J. Syst. Archit., (2022)Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement., , , , , , , и . WASA (1), том 13471 из Lecture Notes in Computer Science, стр. 603-612. Springer, (2022)SeHBPL: Behavioral Semantics-Based Patch Presence Test for Binaries., , , , , и . SETTA, том 14464 из Lecture Notes in Computer Science, стр. 92-111. Springer, (2023)