Author of the publication

Vulnerability Dataset Construction Methods Applied To Vulnerability Detection: A Survey.

, , , , , , , and . DSN Workshops, page 141-146. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Webshell Detection Model Based on Deep Learning., , and . ICAIS (4), volume 11635 of Lecture Notes in Computer Science, page 408-420. Springer, (2019)Fine-Grained Comparable Encryption Scheme in Multi-User Settings., , and . GLOBECOM Workshops, page 1-7. IEEE, (2019)A Blind Watermarking Scheme Using Adaptive Neuro-Fuzzy Inference System Optimized by BP Network and LS Learning Model., , , , and . CSS (2), volume 11983 of Lecture Notes in Computer Science, page 263-274. Springer, (2019)Modeling Data, Information and Knowledge for Security Protection of Hybrid IoT and Edge Resources., , , , , and . IEEE Access, (2019)A secure data deletion scheme for IoT devices through key derivation encryption and data analysis., , , , , , and . Future Gener. Comput. Syst., (2020)Radiofrequency Fingerprint Feature Extraction and Recognition Using a Coordinate Attention-Guided Deep Residual Shrinkage Network., , , , , and . NaNA, page 551-557. IEEE, (2023)Tensor-Based Angle Estimation Approach for Strictly Noncircular Sources with Unknown Mutual Coupling in Bistatic MIMO Radar., , , , , , and . Sensors, 18 (9): 2788 (2018)Hierarchical Attention Network for Interpretable and Fine-Grained Vulnerability Detection., , , , , , , and . INFOCOM Workshops, page 1-6. IEEE, (2022)Deep Learning and Data Randomness based Blind Recognition of Channel Codes., , , , and . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, page 1441-1448. IEEE, (2022)Searchable Encryption Scheme Based on CPABE with Attribute Update in a Cloud Medical Environment., , and . ICCCS (3), volume 11065 of Lecture Notes in Computer Science, page 265-276. Springer, (2018)