Author of the publication

DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping.

, , , and . ACNS, volume 11464 of Lecture Notes in Computer Science, page 155-174. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying Bitcoin Users Using Deep Neural Network., , , , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 178-192. Springer, (2018)PathAFL: Path-Coverage Assisted Fuzzing., , , , and . AsiaCCS, page 598-609. ACM, (2020)Control Flow Obfuscation Using Neural Network to Fight Concolic Testing., , , , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 287-304. Springer, (2014)MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks., , , , and . J. Internet Serv. Inf. Secur., 4 (1): 25-36 (2014)Stochastic single machine scheduling with proportional job weights to minimize deviations of completion times from a common due date.. CDC, page 5124-5127. IEEE, (2003)Stochastic single machine scheduling with earliness and tardiness penalties and proportional weights.. ACC, page 4455-4456. IEEE, (2002)Password Guessing via Neural Language Modeling., , , , and . ML4CS, volume 11806 of Lecture Notes in Computer Science, page 78-93. Springer, (2019)A Secure Architecture for Data Storage in the Cloud Environments., , , and . IMIS, page 289-291. IEEE Computer Society, (2015)Reliable Password Hardening Service with Opt-Out., , and . SRDS, page 250-261. IEEE, (2022)A Typical Set Method of Intrusion Detection Technology Base on Computer Audit Data., , and . CIS, page 687-691. IEEE Computer Society, (2007)