Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Input-free cascode Vthn and Vthp extractor circuits., , and . ICECS, page 282-285. IEEE, (2004)An analytical framework for reliability evaluation of d-dimensional IEEE 802.11 broadcast wireless networks., , , , , and . Wirel. Networks, 26 (5): 3373-3394 (2020)An immersive multi-agent system for interactive applications., , , and . Vis. Comput., 29 (5): 323-332 (2013)CMM: A Combination-Based Mutation Method for SQL Injection., , , and . SOFL+MSVL, volume 12028 of Lecture Notes in Computer Science, page 345-361. Springer, (2019)MuFuzz: Sequence-Aware Mutation and Seed Mask Guidance for Blockchain Smart Contract Fuzzing., , , , , , , , , and . ICDE, page 1972-1985. IEEE, (2024)snWF: Website Fingerprinting Attack by Ensembling the Snapshot of Deep Learning., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)A Large-Scale Pretrained Deep Model for Phishing URL Detection., , , , , and . ICASSP, page 1-5. IEEE, (2023)Software Maintenance Optimization Based on Stackelberg Game Methods., , , , , , and . ISSRE Workshops, page 426-430. IEEE Computer Society, (2014)PyraTrans: Attention-Enriched Pyramid Transformer for Malicious URL Detection., , , , , , and . CoRR, (2023)Struggle with Adversarial Defense? Try Diffusion., , , , , , and . CoRR, (2024)