Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SF-DRDoS: The store-and-flood distributed reflective denial of service attack., , , , , , , , and . Comput. Commun., (2015)Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking., , , , , and . CoRR, (2019)TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime., , and . ACM Conference on Computer and Communications Security, page 331-342. ACM, (2016)Secure dynamic code generation against spraying., , , and . ACM Conference on Computer and Communications Security, page 738-740. ACM, (2010)Moving Targets Detection and Analysis on Multi-Look Polarimetric SAR Images using PWF Method., , and . IGARSS (3), page 1190-1193. IEEE, (2008)Network Expansion and Pathway Enrichment Analysis towards Biologically Significant Findings from Microarrays., , , , , , and . J. Integr. Bioinform., (2012)A Scheme for Enhancing Precision in 3-Dimensional Positioning for Non-Contact Measurement Systems Based on Laser Triangulation., , , , and . Sensors, 18 (2): 504 (2018)Minimal Overhead Optical Time-Domain Reflectometer Via I/O Integrated Data Converter Enabled by Field Programmable Voltage Offset., , and . FPL, page 160-166. IEEE, (2021)Image Generation Based Intra-class Variance Smoothing for Fine-Grained Visual Classification., , , , , and . PRCV (6), volume 14430 of Lecture Notes in Computer Science, page 447-459. Springer, (2023)FeatNet: Large-scale Fraud Device Detection by Network Representation Learning with Rich Features., , , , and . AISec@CCS, page 57-63. ACM, (2018)