From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SEPCOM: customizable zero copy model., , , и . VALUETOOLS, стр. 37. ICST/ACM, (2007)Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization., , , , , , и . NDSS, The Internet Society, (2020)HTFuzz: Heap Operation Sequence Sensitive Fuzzing., , , , , , и . ASE, стр. 53:1-53:13. ACM, (2022)DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware Detection., , , , , и . ACSAC, стр. 227-239. ACM, (2022)FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries., , , , и . USENIX Security Symposium, стр. 2497-2512. USENIX Association, (2022)Detecting concurrency memory corruption vulnerabilities., , , , , , и . ESEC/SIGSOFT FSE, стр. 706-717. ACM, (2019)A Packet Marking Scheme for IP Traceback., , , и . ICN (2), том 3421 из Lecture Notes in Computer Science, стр. 964-971. Springer, (2005)Bind your phone number with caution: automated user profiling through address book matching on smartphone., , , , и . AsiaCCS, стр. 335-340. ACM, (2013)RealDroid: Large-Scale Evasive Malware Detection on "Real Devices"., , , и . ICCCN, стр. 1-8. IEEE, (2017)A Comprehensive Study of Permission Usage on Android., , , , , , и . NSS, том 11058 из Lecture Notes in Computer Science, стр. 64-79. Springer, (2018)