Author of the publication

A Method of Handling Control Dependence in Dynamic Taint Analysis.

, , and . CIT/IUCC/DASC/PICom, page 417-422. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Partial-SMT: Core-scheduling Protection Against SMT Contention-based Attacks., , , , , , and . TrustCom, page 378-385. IEEE, (2020)A capacity self-adaption information hiding algorithm based on RS code., , , , , and . MFI, page 1-8. IEEE, (2014)A Method of Handling Control Dependence in Dynamic Taint Analysis., , and . CIT/IUCC/DASC/PICom, page 417-422. IEEE, (2015)An encryption algorithm of JPEG2000 streams for supporting ciphertext-based transcoding., , , and . MFI, page 1-7. IEEE, (2014)A dynamic marking method for implicit information flow in dynamic taint analysis., , and . SIN, page 275-282. ACM, (2015)An Uneven Distributed System for Dynamic Taint Analysis Framework., , , and . CSCloud, page 237-240. IEEE Computer Society, (2015)Analysis and Design on Key Updating Policies for Satellite Networks., , and . Int. J. Comput. Commun. Control, 3 (4): 343-352 (2008)Contextual Insight: Detecting Abnormal Device Behaviors in IoT Systems., , , , and . CSCWD, page 1268-1273. IEEE, (2024)Survey on Privacy Protection of Android Devices., , , and . CSCloud, page 241-246. IEEE Computer Society, (2015)Joint FEC codes and hash chains for optimizing authentication of JPEG2000 image streaming., , , and . ICME, page 1-6. IEEE Computer Society, (2013)