From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Empirical Study on Implicit Constraints in Smart Contract Static Analysis., , , , , , , и . ICSE (SEIP), стр. 31-32. IEEE, (2022)Discriminance of activation time for bus dispatching under the environment of Intelligent Vehicle-Infrastructure Cooperation., , , , и . ITSC, стр. 2257-2258. IEEE, (2014)Event-Based Secure Leader-Following Consensus Control for Multiagent Systems With Multiple Cyber Attacks., , , , и . IEEE Trans. Cybern., 51 (1): 162-173 (2021)Event-Triggered State Estimation for T-S Fuzzy Neural Networks with Stochastic Cyber-Attacks., , , , и . Int. J. Fuzzy Syst., 21 (2): 532-544 (2019)Sketch Animation Techniques and Applications Based on Mobile Devices., , , и . APWCS, стр. 78-81. IEEE Computer Society, (2010)High-Pressure-Induced Comminution and Recrystallization of CH3NH3PbBr3 Nanocrystals as Large Thin Nanoplates, , , , , , , , , и 2 other автор(ы). Advanced Materials, (2017)KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations., , , , , и . USENIX Security Symposium, стр. 5039-5054. USENIX Association, (2023)From Exposed to Exploited: Drawing the Picture of Industrial Control Systems Security Status in the Internet Age., , , , , , , и . ICISSP, стр. 237-248. SCITEPRESS, (2021)VScape: Assessing and Escaping Virtual Call Protections., , , , и . USENIX Security Symposium, стр. 1719-1736. USENIX Association, (2021)The Application of SOM Network to Clustering Enterprises Based on Questionnaires., , , , , и . FSKD (3), стр. 706-710. IEEE Computer Society, (2007)0-7695-2874-0.