From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Learning Stylometric Representations for Authorship Analysis., , , и . IEEE Trans. Cybern., 49 (1): 107-121 (2019)MaGnn: Binary-Source Code Matching by Modality-Sharing Graph Convolution for Binary Provenance Analysis., и . COMPSAC, стр. 658-666. IEEE, (2023)Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3., , и . FPS, том 13291 из Lecture Notes in Computer Science, стр. 235-252. Springer, (2021)GenTAL: Generative Denoising Skip-gram Transformer for Unsupervised Binary Code Similarity Detection., , и . IJCNN, стр. 1-8. IEEE, (2023)Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware., , и . FPS (1), том 14551 из Lecture Notes in Computer Science, стр. 269-284. Springer, (2023)Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection., , , , и . CoRR, (2024)D2D-MAP: A Drone to Drone Authentication Protocol Using Physical Unclonable Functions., , и . IEEE Trans. Veh. Technol., 72 (4): 5079-5093 (апреля 2023)An Empirical Study on Developers Shared Conversations with ChatGPT in GitHub Pull Requests and Issues., , , , , , и . CoRR, (2024)Kam1n0: MapReduce-based Assembly Clone Search for Reverse Engineering., , и . KDD, стр. 461-470. ACM, (2016)Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization., , и . IEEE Symposium on Security and Privacy, стр. 472-489. IEEE, (2019)