Author of the publication

Exploiting the Trust Between Boundaries: Discovering Memory Corruptions in Printers via Driver-Assisted Testing.

, , , , , , , , , and . LCTES, page 74-84. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey on Side-Channel Attacks of Strong PUF., , , and . ICAIS (2), volume 12240 of Lecture Notes in Computer Science, page 74-85. Springer, (2020)Exploiting the Trust Between Boundaries: Discovering Memory Corruptions in Printers via Driver-Assisted Testing., , , , , , , , , and . LCTES, page 74-84. ACM, (2020)Multiple Sound Source Localization Exploiting Robot Motion and Approaching Control., , , , and . IEEE Trans. Instrum. Meas., (2023)DSLA: Dynamic smooth label assignment for efficient anchor-free object detection., , , , and . CoRR, (2022)A 45-2500 MHz high efficiency power amplifier with novel adaptive bias technique., , and . IEICE Electron. Express, 17 (8): 20190726 (2020)JSidentify: a hybrid framework for detecting plagiarism among JavaScript code in online mini games., , , , , , , , , and 3 other author(s). ICSE (SEIP), page 211-220. ACM, (2020)αDiff: cross-version binary code similarity detection with DNN., , , , , , and . ASE, page 667-678. ACM, (2018)The Chinese Bag-of-Opinions Method for Hot-Topic-Oriented Sentiment Analysis on Weibo., , , , , and . CSWS, page 357-367. Springer, (2012)Interconnect open defect diagnosis with minimal physical information., , , , , and . ITC, page 1-10. IEEE Computer Society, (2007)Time Domain Adversarial Voice Conversion for ADD 2022., , , , , , , and . ICASSP, page 9221-9225. IEEE, (2022)