Author of the publication

Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem.

, , , , , and . CCS, page 2975-2988. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Deep Learning Model for Traffic Flow State Classification Based on Smart Phone Sensor Data., , , and . CoRR, (2017)Average probe complexity of non-dominated coteries (brief announcement)., , and . PODC, page 340. ACM, (2000)News-Topic Oriented Hashtag Recommendation in Twitter Based on Characteristic Co-occurrence Word Detection., , and . ICWE, volume 7387 of Lecture Notes in Computer Science, page 16-30. Springer, (2012)Human facial expression mining based on cloud model., , , and . GrC, page 557-560. IEEE Computer Society, (2009)VDB-MR: MapReduce-based distributed data integration using virtual database., , , , , and . Future Gener. Comput. Syst., 26 (8): 1418-1425 (2010)Aromatics production from methanol and pentane: Conceptual process design, comparative energy and techno-economic analysis., , and . Comput. Chem. Eng., (2019)Improved Traffic Sign Detection and Recognition Algorithm for Intelligent Vehicles., , , , and . Sensors, 19 (18): 4021 (2019)Triboelectric Nanogenerator and Integration with Electrochemical Microsupercapacitor., , and . CRC, page 169-173. IEEE, (2019)A global shallow water model using high order multi-moment constrained finite volume method and icosahedral grid., and . J. Comput. Phys., 229 (5): 1774-1796 (2010)Learning to Delay in Ride-Sourcing Systems: A Multi-Agent Deep Reinforcement Learning Framework., , , and . IEEE Trans. Knowl. Data Eng., 34 (5): 2280-2292 (2022)