Author of the publication

RENN: Efficient Reverse Execution with Neural-Network-Assisted Alias Analysis.

, , , , , , , and . ASE, page 924-935. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PubDNA Finder: a web database linking full-text articles to sequences of nucleic acids., , , , , , , , and . Bioinform., 26 (21): 2801-2802 (2010)Is your digital neighbor a reliable investment advisor?, , , , , and . WWW, page 3581-3591. ACM, (2023)Measurement by Proxy: On the Accuracy of Online Marketplace Measurements., , , , and . USENIX Security Symposium, page 2153-2170. USENIX Association, (2022)Bayesian autoregressive spectral estimation., , , and . LA-CCI, page 1-7. IEEE, (2021)A method for automatically extracting infectious disease-related primers and probes from the literature., , , , , , , , , and . BMC Bioinform., (2010)SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations., , , , , , , , and . EuroS&P, page 440-456. IEEE, (2021)RENN: Efficient Reverse Execution with Neural-Network-Assisted Alias Analysis., , , , , , , and . ASE, page 924-935. IEEE, (2019)Minimally invasive surgical skills evaluation in the field of otolaryngology., , , , and . CBMS, page 83-88. IEEE Computer Society, (2013)Identifying Risky Vendors in Cryptocurrency P2P Marketplaces., , and . WWW, page 99-110. ACM, (2024)Understanding the Reproducibility of Crowd-reported Security Vulnerabilities., , , , , , and . USENIX Security Symposium, page 919-936. USENIX Association, (2018)