Author of the publication

SEEKER: A Root Cause Analysis Method Based on Deterministic Replay for Multi-Type Network Protocol Vulnerabilities.

, , , , , and . TrustCom, page 131-138. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rolling Bearing Fault Diagnosis Using Refinement Envelope Analysis Based on the EMD Method., , and . ICIC (3), volume 2 of Communications in Computer and Information Science, page 562-570. Springer, (2007)Convexity of Minimal Total Dominating Functions in Graphs.. COCOON, volume 959 of Lecture Notes in Computer Science, page 357-365. Springer, (1995)Finite Element Analysis of A new Multi-DOF Flexible Micro-Displacement Manipulator Based on Ferrofluid., , , and . AIM, page 980-985. IEEE, (2018)Relay Location Optimization for Full-Duplex Decode-and-Forward Relaying., , , and . MILCOM, page 13-18. IEEE, (2013)A reliable messaging middleware for financial institutions., , and . ICCIP, page 108-112. ACM, (2017)A new hierarchical method for music genre classification., , , , and . CISP-BMEI, page 1033-1037. IEEE, (2016)Finding a sparse solution of a class of linear differential equations by solving a nonlinear system., and . SNC, page 70-77. ACM, (2014)Convexity of minimal total dominating functions in graphs.. J. Graph Theory, 24 (4): 313-321 (1997)Determining inertial measurement unit placement for estimating human trunk sway while standing, walking and running., , , , , and . EMBC, page 4651-4654. IEEE, (2015)ECG Monitoring over Bluetooth: Data Compression and Transmission., , and . WCNC, page 1-5. IEEE, (2010)