Author of the publication

Detecting Logic Vulnerabilities in E-commerce Applications.

, , and . NDSS, The Internet Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Origin of Photocurrent in Fullerene-Based Solar Cells, , , , and . The Journal of Physical Chemistry C, 122 (27): 15140--15148 (June 2018)Achieving interoperability for integration of heterogeneous COTS geographic information systems., , , and . ACM-GIS, page 162-167. ACM, (2002)Aggressive code-division generalized processor sharing for QoS guarantee in multimedia CDMA cellular networks., , and . GLOBECOM, page 951-955. IEEE, (2002)Online multi-object tracking based on global and local features., , , and . VCIP, page 1-4. IEEE, (2016)Nonlinear Robust Anti-Windup Control Design base on Precise Feedback Linearization., , , , , and . ICCA, page 663-668. IEEE, (2019)An Aerodynamics Calculation Method of a Flapping Wing Flying Robot Based on State-Space Airloads Theory., , , , , and . ROBIO, page 1821-1826. IEEE, (2019)A Smart Contract-Based Risk Warning Blockchain Symbiotic System for Cross-border Products., , and . ICEBE, volume 41 of Lecture Notes on Data Engineering and Communications Technologies, page 274-289. Springer, (2019)A Novel Waveform for Radar and Communication Integration in the Satellite System., , and . CSPS (1), volume 515 of Lecture Notes in Electrical Engineering, page 630-637. Springer, (2018)SEMG and KNN Based Human Motion Intention Recognition for Active and Safe Neurorehabilitation., , , , , , and . Aust. J. Intell. Inf. Process. Syst., 15 (3): 43-52 (2019)Hierarchical method for cataract grading based on retinal images using improved Haar wavelet., , , , and . CoRR, (2019)