Author of the publication

SecretSafe: A Lightweight Approach against Heap Buffer Over-Read Attack.

, , , , and . COMPSAC (1), page 628-636. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maelstrom: Receiver-Location Preserving in Wireless Sensor Networks., , , , and . WASA, volume 6843 of Lecture Notes in Computer Science, page 190-201. Springer, (2011)An algorithm of pose estimation based on conic correspondences., , , and . ROBIO, page 314-319. IEEE, (2017)Research on context-aware architecture for personal information privacy protection., , , , and . SMC, page 3912-3916. IEEE, (2007)Multi-step Ahead Time Series Forecasting for Different Data Patterns Based on LSTM Recurrent Neural Network., , , and . WISA, page 305-310. IEEE, (2017)Say No to Price Discrimination: Decentralized and Automated Incentives for Price Auditing in Ride-Hailing Services., , , , , and . IEEE Trans. Mob. Comput., 21 (2): 663-680 (2022)A Comprehensive Trust Model Based on Reputation and Fuzzy Theory., , , , , and . J. Comput., 9 (11): 2666-2676 (2014)Bio-inspired Mechanism and Model Exploration of Software Aging., , , and . CoRR, (2014)Blockchain-Aware Rollbackable Data Access Control for IoT-Enabled Digital Twin., , , and . IEEE J. Sel. Areas Commun., 41 (11): 3517-3532 (November 2023)Semantic-Informed Driver Fuzzing Without Both the Hardware Devices and the Emulators., , , and . NDSS, The Internet Society, (2022)Study on Influencing Factors of Microblog User's Malicious Disinhibition Behavior., , , and . IMMS, page 84-95. ACM, (2023)