Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

State-of-the-Art: Security Competition in Talent Education., , , and . Inscrypt, volume 10726 of Lecture Notes in Computer Science, page 461-481. Springer, (2017)Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection., , , , , and . TrustCom/BigDataSE, page 744-753. IEEE, (2018)Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis., , , , , , , , and . SP, page 1197-1214. IEEE, (2021)Attack Detection by Rough Set Theory in Recommendation System., , and . GrC, page 692-695. IEEE Computer Society, (2010)An Approach for Scale Suspicious Network Events Detection., , , , , and . IEEE BigData, page 5854-5863. IEEE, (2019)Ghost in the Binder: Binder Transaction Redirection Attacks in Android System Services., , , , and . CCS, page 1581-1597. ACM, (2021)Spear Phishing Emails Detection Based on Machine Learning., , , , and . CSCWD, page 354-359. IEEE, (2021)Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications., , , , , , and . USENIX Security Symposium, page 1307-1324. USENIX Association, (2021)Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning., , , , , , , and . USENIX Security Symposium, page 3529-3545. USENIX Association, (2023)ModX: Binary Level Partially Imported Third-Party Library Detection via Program Modularization and Semantic Matching., , , , , and . ICSE, page 1393-1405. ACM, (2022)