Author of the publication

Unexpected Data Dependency Creation and Chaining: A New Attack to SDN.

, , , , , and . SP, page 1512-1526. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Value-based program characterization and its application to software plagiarism detection., , , , , and . ICSE, page 756-765. ACM, (2011)Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries., , , and . EuroS&P, page 1-16. IEEE, (2020)Automatic grading of programming assignments: an approach based on formal semantics., , , and . ICSE (SEET), page 126-137. IEEE / ACM, (2019)Automatic building information model query generation., , , , , , , and . J. Inf. Technol. Constr., (2015)Translingual Obfuscation., , , , and . EuroS&P, page 128-144. IEEE, (2016)FusionRetro: Molecule Representation Fusion via In-Context Learning for Retrosynthetic Planning., , , , , , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 22028-22041. PMLR, (2023)Distilling Knowledge on Text Graph for Social Media Attribute Inference., , , and . SIGIR, page 2024-2028. ACM, (2022)A first step towards algorithm plagiarism detection., , , , and . ISSTA, page 111-121. ACM, (2012)BinCFP: Efficient Multi-threaded Binary Code Control Flow Profiling., and . SCAM, page 61-66. IEEE Computer Society, (2016)MetaHunt: Towards Taming Malware Mutation via Studying the Evolution of Metamorphic Virus., , , , and . SPRO@CCS, page 15-26. ACM, (2019)