Author of the publication

Software Vulnerability Detection Using an Enhanced Generalization Strategy.

, , , , , and . SETTA, volume 14464 of Lecture Notes in Computer Science, page 226-242. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Topic optimization method based on Laplace score., and . ICMLC, page 797-802. IEEE, (2015)Performance of active codes detection algorithms for the downlink of TD-SCDMA system., , , and . ISCAS (1), page 613-616. IEEE, (2002)FIR-RAKE receiver for TD-SCDMA mobile terminals., , and . ISCAS, IEEE, (2006)Finite Load Analysis of IEEE 802.11 Distributed Coordination Function., , and . ICC, page 2561-2565. IEEE, (2008)IEEE 802.11 Distributed Coordination Function service time and queuing delay analysis using Parallel Space - Time Markov Chain., , , and . PIMRC, page 1-5. IEEE, (2008)Learning Non-parametric Markov Networks with Mutual Information., , , and . PGM, volume 72 of Proceedings of Machine Learning Research, page 213-224. PMLR, (2018)Optimal design of a compound hybrid system consisting of torque coupling and energy regeneration for hydraulic hybrid excavator., , , and . AIM, page 1525-1530. IEEE, (2015)Performance analysis of IEEE 802.11e EDCF under saturation condition.. ICC, page 170-174. IEEE, (2004)Adaptive leader-following formation control with collision avoidance for a class of second-order nonlinear multi-agent systems., , , , , and . Neurocomputing, (2019)Efficient Airport Detection Using Line Segment Detector and Fisher Vector Representation., , , , and . IEEE Geosci. Remote. Sens. Lett., 13 (8): 1079-1083 (2016)