Author of the publication

Research on SSTI attack defense technology based on instruction set randomization.

, , , , and . ICAIIS, page 287:1-287:5. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of edge caching/offloading for dynamic content delivery., , and . WWW, page 461-471. ACM, (2003)Alignments without low-scoring regions., , and . RECOMB, page 294-301. ACM, (1998)On the impact of route monitor selection., , , , and . Internet Measurement Conference, page 215-220. ACM, (2007)Proxy+: Simple Proxy Augmentation for Dynamic Content Processing., , and . WCW, page 91-108. Kluwer, (2003)Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting., , , , and . IPTPS, volume 3279 of Lecture Notes in Computer Science, page 184-194. Springer, (2004)Authorization Views and Conditional Query Containment., and . ICDT, volume 3363 of Lecture Notes in Computer Science, page 259-273. Springer, (2005)Feature Enhanced Fully Convolutional Networks for Monocular Depth Estimation., , , and . DSAA, page 270-276. IEEE, (2019)Corey: An Operating System for Many Cores, , , , , , , , , and 2 other author(s). Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI '08), San Diego, California, (December 2008)Media Companion: Delivering Content-oriented Web Services to Internet Media., , , , , and . WWW (Posters), (2003)DCT-block Difference based Noise Estimation using an Iterative Framework., , , and . ICSPS, page 94-99. ACM, (2016)