From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Secure Hierarchical Key Management Scheme in Wireless Sensor Network., , , , и . IJDSN, (2012)Terminal Access Data Anomaly Detection Based on GBDT for Power User Electric Energy Data Acquisition System., , , , и . EIDWT, том 29 из Lecture Notes on Data Engineering and Communications Technologies, стр. 137-147. Springer, (2019)Static vulnerability mining of IoT devices based on control flow graph construction and graph embedding network., , , , и . Comput. Commun., (2023)A taint based approach for automatic reverse engineering of gray-box file formats., , , и . Soft Comput., 20 (9): 3563-3578 (2016)Watching your call: Breaking VoLTE Privacy in LTE/5G Networks., , , , и . CoRR, (2023)Outsourced privacy-aware task allocation with flexible expressions in crowdsourcing., , , и . Future Gener. Comput. Syst., (2020)Trustworthy Network Anomaly Detection Based on an Adaptive Learning Rate and Momentum in IIoT., , , , , и . IEEE Trans. Ind. Informatics, 16 (9): 6182-6192 (2020)Learning URL Embedding for Malicious Website Detection., , , , , и . IEEE Trans. Ind. Informatics, 16 (10): 6673-6681 (2020)A novel vulnerability detection method for ZigBee MAC layer., , , , и . Int. J. Grid Util. Comput., 4 (2/3): 134-143 (2013)Malware Detection Using Machine Learning Based on the Combination of Dynamic and Static Features., , , и . ICCCN, стр. 1-6. IEEE, (2018)