Author of the publication

Web Scanner Detection Based on Behavioral Differences.

, , , , and . SocialSec, volume 1095 of Communications in Computer and Information Science, page 1-16. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on 3D Simulation Technology Applied in Navigation-Aid Management., , and . CW, page 597-600. IEEE Computer Society, (2008)Generalized projective synchronization of fractional order chaotic systems, , and . Physica A: Statistical Mechanics and its Applications, 387 (14): 3738--3746 (Jun 1, 2008)JTaint: Finding Privacy-Leakage in Chrome Extensions., , , , and . ACISP, volume 12248 of Lecture Notes in Computer Science, page 563-583. Springer, (2020)Computation of universal unfolding of the double zero bifurcation in the Z2-symmetric system., and . Int. J. Comput. Math., 91 (3): 461-479 (2014)Research on WEBGIS real-time distribution system of port navigation-supporting information., , , , and . IGARSS, page 3. IEEE, (2005)An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation., , , , , , and . IEEE Trans. Inf. Forensics Secur., 13 (12): 3008-3018 (2018)Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization., , , , , , and . CCS, page 2858-2874. ACM, (2021)Obfuscation-Resilient Executable Payload Extraction From Packed Malware., , , , , , and . USENIX Security Symposium, page 3451-3468. USENIX Association, (2021)MetaBox: A Benchmark Platform for Meta-Black-Box Optimization with Reinforcement Learning., , , , , , , and . CoRR, (2023)Dynamic Trustiness Authentication Framework Based on Software's Behavior Integrity., , , and . ICYCS, page 2283-2288. IEEE Computer Society, (2008)