Author of the publication

Xmark: Dynamic Software Watermarking Using Collatz Conjecture.

, , , , and . IEEE Trans. Inf. Forensics Secur., 14 (11): 2859-2874 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Password Guessing via Neural Language Modeling., , , , and . ML4CS, volume 11806 of Lecture Notes in Computer Science, page 78-93. Springer, (2019)Reliable Password Hardening Service with Opt-Out., , and . SRDS, page 250-261. IEEE, (2022)PathAFL: Path-Coverage Assisted Fuzzing., , , , and . AsiaCCS, page 598-609. ACM, (2020)Control Flow Obfuscation Using Neural Network to Fight Concolic Testing., , , , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 287-304. Springer, (2014)Stochastic single machine scheduling with earliness and tardiness penalties and proportional weights.. ACC, page 4455-4456. IEEE, (2002)Stochastic single machine scheduling with proportional job weights to minimize deviations of completion times from a common due date.. CDC, page 5124-5127. IEEE, (2003)Linear Obfuscation to Combat Symbolic Execution., , , and . ESORICS, volume 6879 of Lecture Notes in Computer Science, page 210-226. Springer, (2011)Software Watermarking Using Support Vector Machines., and . COMPSAC, page 533-542. IEEE Computer Society, (2015)Security-Enhanced Timed-Release Encryption in the Random Oracle Model., , , , , and . SocialSec, volume 1298 of Communications in Computer and Information Science, page 41-51. Springer, (2020)Performance Evaluation of a Collaborative Intrusion Detection System., and . ICNC (6), page 409-413. IEEE Computer Society, (2009)