Author of the publication

Detecting concurrency vulnerabilities based on partial orders of memory and thread events.

, , , , and . ESEC/SIGSOFT FSE, page 280-291. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DistForest: A Parallel Random Forest Training Framework Based on Supercomputer., , , , and . HPCC/SmartCity/DSS, page 196-204. IEEE, (2018)Numerical Semantic Modeling for Implicit Discourse Relation Recognition., , and . ICASSP, page 1-5. IEEE, (2023)A Novel Approach for Text Classification by Combining Pre-trained BERT Model with CNN Classifier., , and . ICISCAE, page 57-62. IEEE, (2023)Research and Development of Progressive Experimental System for Digital Electronic Technology with Fusion of Virtuality and Reality., , , , , and . ICEIT, page 186-191. IEEE, (2023)A Blockchain-Based IoT Data Management System for Secure and Scalable Data Sharing., , , , and . NSS, volume 11928 of Lecture Notes in Computer Science, page 167-184. Springer, (2019)A more practical CPA attack against present hardware implementation., , , , and . CCIS, page 1248-1253. IEEE, (2012)A Fast Alternative for Template Matching: An ObjectCode Method., , , and . ACPR, page 425-429. IEEE, (2013)Meta Computing., , , , , , and . CoRR, (2023)Revisiting ARM Debugging Features: Nailgun and its Defense., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (1): 574-589 (2023)SocialSift: Target Query Discovery on Online Social Media With Deep Reinforcement Learning., , , , , , , and . IEEE Trans. Neural Networks Learn. Syst., 34 (9): 5654-5668 (September 2023)