From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

VSFBS: Vulnerability Search in Firmware Based on String., , , , , , , и . DSA, стр. 555-563. IEEE, (2020)Research on Abnormal Traffic Detection of Internet of Things Based on Feature Selection., , и . CNIOT, стр. 576-582. ACM, (2023)A Heterogeneous High Speed Wireless Body Sensor Network Based on SC-UWB and ZIGBEE., , , , , и . GLOBECOM, стр. 1-5. IEEE, (2011)An Integrated Architecture for IoT Malware Analysis and Detection., , , , , , и . IoTaaS, том 271 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 127-137. Springer, (2018)VSkLCG A Method for Cross-Platform Vulnerability Search in Firmware., , , , , , и . DSA, стр. 395-400. IEEE, (2019)Knowledge Enhanced GAN for IoT Traffic Generation., , , , , , и . WWW, стр. 3336-3346. ACM, (2022)IHB: A scalable and efficient scheme to identify homologous binaries in IoT firmwares., , , , , и . IPCCC, стр. 1-8. IEEE Computer Society, (2017)Grainflow: a per-bit customizable scheme for data plane innovation on programmable hardware., , , , и . StudentWorkshop@CoNEXT, стр. 13:1-13:2. ACM, (2011)Vulnerability Detection in Firmware Based on Clonal Selection Algorithm., , , , , , и . SSCI, стр. 1915-1921. IEEE, (2019)Gradient-Based Adversarial Attacks Against Malware Detection by Instruction Replacement., , , , , , , и . WASA (1), том 13471 из Lecture Notes in Computer Science, стр. 603-612. Springer, (2022)