From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Decrypted data detection algorithm based on dynamic dataflow analysis., , , и . CITS, стр. 1-4. IEEE, (2014)A Systematic Treat Model for Software-Defined Networking., , , и . KSII Trans. Internet Inf. Syst., 15 (2): 580-599 (2021)ER-Fuzz:Conditional Code Removed Fuzzing., , , и . KSII Trans. Internet Inf. Syst., 13 (7): 3511-3532 (2019)A comprehensive survey of vulnerability detection method towards Linux-based IoT devices., , , и . CNCIT, стр. 35-41. ACM, (2023)A Third-Order CIFF Noise-Shaping SAR ADC with Nonbinary Split-Capacitor DAC., , , и . APCCAS, стр. 162-165. IEEE, (2022)DarkTrans: A Blockchain-based Covert Communication Scheme with High Channel Capacity and Strong Concealment., , , , и . ICPADS, стр. 675-682. IEEE, (2023)SDNGuardian: Secure Your REST NBIs with API-Grained Permission Checking System., , , и . SecureComm, том 198 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 762-765. Springer, (2016)Directer: A Parallel and Directed Fuzzing based on Concolic Execution., , и . ICSIE, стр. 87-92. ACM, (2018)An Improved Offline Symbolic Execution Approach., , и . CSAI/ICIMT, стр. 314-320. ACM, (2018)Deepbug: Bug Injection in Depth., , , и . EITCE, стр. 713-718. ACM, (2021)