Author of the publication

Efficient vulnerability detection based on an optimized rule-checking static analysis technique.

, , , , , , , and . Frontiers Inf. Technol. Electron. Eng., 18 (3): 332-345 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Method for Learning Bayesian Networks by Using Immune Binary Particle Swarm Optimization., , and . FGIT-DTA, volume 64 of Communications in Computer and Information Science, page 115-121. Springer, (2009)A hybrid particle swarm optimization method for structure learning of probabilistic relational models., and . Inf. Sci., (2014)Bose–Einstein condensation on an atom chip, , , , , and . Chinese Physics B, 18 (10): 4259+ (Oct 1, 2009)Efficient vulnerability detection based on an optimized rule-checking static analysis technique., , , , , , , and . Frontiers Inf. Technol. Electron. Eng., 18 (3): 332-345 (2017)Research on the application of LDPC code in chaotic sequence image encryption., , , , and . Clust. Comput., 22 (Supplement): 6359-6370 (2019)Optimal Design of Airborne Test System Based on Model Analysis., , and . CSDM Asia / CSDM, page 485. Springer, (2021)Learning Bayesian Networks Structures Based on Memory Binary Particle Swarm Optimization., , and . SEAL, volume 4247 of Lecture Notes in Computer Science, page 568-574. Springer, (2006)Hybrid Data Clustering Based on Dependency Structure and Gibbs Sampling., , and . Australian Conference on Artificial Intelligence, volume 4304 of Lecture Notes in Computer Science, page 1145-1151. Springer, (2006)Learning Bayesian Networks Structure with Continuous Variables., , and . ADMA, volume 4093 of Lecture Notes in Computer Science, page 448-456. Springer, (2006)Learning Bayesian Networks Structures from Incomplete Data: An Efficient Approach Based on Extended Evolutionary Programming., , and . PAKDD, volume 3518 of Lecture Notes in Computer Science, page 474-479. Springer, (2005)