From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

JITDefender: A Defense against JIT Spraying Attacks., , , и . SEC, том 354 из IFIP Advances in Information and Communication Technology, стр. 142-153. Springer, (2011)Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation., , , , и . ISC, том 6531 из Lecture Notes in Computer Science, стр. 181-195. Springer, (2010)CloudER: a framework for automatic software vulnerability location and patching in the cloud., , и . AsiaCCS, стр. 50. ACM, (2012)CATI: Context-Assisted Type Inference from Stripped Binaries., , и . DSN, стр. 88-98. IEEE, (2020)Performance-Guaranteed Finite-Time Tracking for Uncertain Strict-Feedback Nonlinear Systems., , , и . IEEE Trans. Circuits Syst. II Express Briefs, 71 (1): 375-379 (января 2024)Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling and Callbacks., , , , и . EAI Endorsed Trans. Security Safety, 4 (11): e2 (2017)An Empirical Study on Benchmarks of Artificial Software Vulnerabilities., , , , , и . CoRR, (2020)Ground Truth for Binary Disassembly is Not Easy., , , , и . USENIX Security Symposium, стр. 2479-2495. USENIX Association, (2022)ROPOB: Obfuscating Binary Code via Return Oriented Programming., , , , , и . SecureComm, том 238 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 721-737. Springer, (2017)Uncertainty-guided Mutual Consistency Training for Semi-supervised Biomedical Relation Extraction., , , , , , и . BIBM, стр. 2318-2325. IEEE, (2022)