Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Routing Policy Conflict Detection without Violating ISP's Privacy., , , and . CSE (3), page 337-342. IEEE Computer Society, (2009)Data-Driven Vulnerability Pattern Analysis for Fuzzing., , , and . DSC, page 930-935. IEEE, (2018)A Study on Vulnerability Code Labeling Method in Open-Source C Programs., , , , , and . DEXA (1), volume 14146 of Lecture Notes in Computer Science, page 52-67. Springer, (2023)InFuzz: An Interactive Tool for Enhancing Efficiency in Fuzzing through Visual Bottleneck Analysis (Registered Report)., , , and . FUZZING, page 56-61. ACM, (2023)A Survey of Human-machine Collaboration in Fuzzing., , and . DSC, page 375-382. IEEE, (2022)AS Alliance based security enhancement for inter-domain routing protocol., , , and . Math. Comput. Model., 55 (1-2): 241-255 (2012)CBSTM: Cloud-based Behavior Similarity Transmission Method to Detect Industrial Worms., , and . ICCC, page 158. ACM, (2013)Worm Detection without Knowledge Base in Industrial Networks., , , , and . J. Commun., 8 (11): 716-723 (2013)Test Suite Generation Based on Context-Adapted Structural Coverage for Testing DNN., , , , , , and . APNOMS, page 1-6. IEEE, (2023)Detecting Adversarial Samples in Neural Network with Statistical Metrics: A Practical Approach., , , and . DSC, page 662-669. IEEE, (2021)