Author of the publication

Brute Force Vulnerability Testing Technology Based on Data Mutation.

, , and . VTC Fall, page 1-6. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EulerFormer: Sequential User Behavior Modeling with Complex Vector Attention., , , , , and . SIGIR, page 1619-1628. ACM, (2024)UFIN: Universal Feature Interaction Network for Multi-Domain Click-Through Rate Prediction., , , , , and . CoRR, (2023)An Algorithm for Solving Inverse Eigenproblem of Generalized Periodic Jacobi Matrices., , and . ISCSCT (1), page 84-87. IEEE Computer Society, (2008)Adaptive Unscented Kalman Filter for Target Tracking in the Presence of Nonlinear Systems Involving Model Mismatches., , , , and . Remote Sensing, 9 (7): 657 (2017)Using Blind Optimization Algorithm for Hardware/Software Partitioning., , , , and . IEEE Access, (2017)Highly Squinted Imaging for Diving SAR with 3-Dacceleration., , , , and . IGARSS, page 8917-8920. IEEE, (2018)A novel Lyapunov-Krasovskii functional approach to stability and stabilization for T-S fuzzy systems with time delay., , , and . Neurocomputing, (2018)Direct harmonic voltage control strategy for shunt active power filter., , , , , and . IECON, page 1101-1106. IEEE, (2017)Application of Principal Component Cluster Analysis in the Quality of Cordyceps Sinensis., , , , , , and . CCTA, volume 509 of IFIP Advances in Information and Communication Technology, page 279-283. Springer, (2016)Brute Force Vulnerability Testing Technology Based on Data Mutation., , and . VTC Fall, page 1-6. IEEE, (2011)