Author of the publication

Detecting concurrency vulnerabilities based on partial orders of memory and thread events.

, , , , and . ESEC/SIGSOFT FSE, page 280-291. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fast Alternative for Template Matching: An ObjectCode Method., , , and . ACPR, page 425-429. IEEE, (2013)A DPA resistant dual rail Préchargé logic cell., , , and . ASICON, page 1-4. IEEE, (2015)GNMF Revisited: Joint Robust k-NN Graph and Reconstruction-Based Graph Regularization for Image Clustering., , , , , and . ICANN (2), volume 10614 of Lecture Notes in Computer Science, page 442-449. Springer, (2017)Modeling User Browsing Activity for Application Layer DDoS Attack Detection., , , and . SecureComm, volume 198 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 747-750. Springer, (2016)DistForest: A Parallel Random Forest Training Framework Based on Supercomputer., , , , and . HPCC/SmartCity/DSS, page 196-204. IEEE, (2018)Meta Computing., , , , , , and . CoRR, (2023)Revisiting ARM Debugging Features: Nailgun and its Defense., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (1): 574-589 (2023)SocialSift: Target Query Discovery on Online Social Media With Deep Reinforcement Learning., , , , , , , and . IEEE Trans. Neural Networks Learn. Syst., 34 (9): 5654-5668 (September 2023)Numerical Semantic Modeling for Implicit Discourse Relation Recognition., , and . ICASSP, page 1-5. IEEE, (2023)A Novel Approach for Text Classification by Combining Pre-trained BERT Model with CNN Classifier., , and . ICISCAE, page 57-62. IEEE, (2023)