From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features., , , , , , , и . ICICS, том 11999 из Lecture Notes in Computer Science, стр. 430-446. Springer, (2019)A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based Neural Combinatorial Optimization Network., , , , , и . IEEE Trans. Cloud Comput., 11 (4): 3381-3395 (октября 2023)Anti-Compression Contrastive Facial Forgery Detection., , , , , и . CoRR, (2023)Antenna Array Diagnosis for Millimeter-Wave MIMO Systems., , , и . CoRR, (2021)CDRep: Automatic Repair of Cryptographic Misuses in Android Applications., , , и . AsiaCCS, стр. 711-722. ACM, (2016)Orchestration or Automation: Authentication Flaw Detection in Android Apps., , , , , , , и . IEEE Trans. Dependable Secur. Comput., 19 (4): 2165-2178 (2022)A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks., , , , и . IEEE Trans. Inf. Forensics Secur., (2024)Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning., , , , , , , , , и . USENIX Security Symposium, стр. 4607-4624. USENIX Association, (2023)SparrowHawk: Memory Safety Flaw Detection via Data-Driven Source Code Annotation., , , , и . Inscrypt, том 13007 из Lecture Notes in Computer Science, стр. 129-148. Springer, (2021)PrIntFuzz: fuzzing Linux drivers via automated virtual device simulation., , , , , , и . ISSTA, стр. 404-416. ACM, (2022)