Author of the publication

Research on SSTI attack defense technology based on instruction set randomization.

, , , , and . ICAIIS, page 287:1-287:5. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discussion on a new paradigm of endogenous security towards 6G networks., , , , , , , , and . Frontiers Inf. Technol. Electron. Eng., 23 (10): 1421-1450 (2022)Secure Transmission Scheme Based on the Artificial Noise in D2D-Enabled Full-Duplex Cellular Networks., , , , , and . KSII Trans. Internet Inf. Syst., 13 (10): 4923-4939 (2019)MIN: Co-Governing Multi-Identifier Network Architecture and its Prototype on Operator's Network., , , , , , , , , and 21 other author(s). CoRR, (2019)The Prototype of Decentralized Multilateral Co-Governing Post-IP Internet Architecture and Its Testing on Operator Networks., , , , , , , , , and 25 other author(s). CoRR, (2019)Link Prediction Based on Information Preference Connection for Directed Network., , , and . SmartIoT, page 183-189. IEEE, (2020)A proactive defense mechanism for mobile communication user data., , , and . Sci. China Inf. Sci., 61 (10): 109303:1-109303:3 (2018)Secure D2D Communication Underlying Cellular Networks: Artificial Noise Assisted., , , and . VTC Fall, page 1-5. IEEE, (2016)FLPP: A Federated-Learning-Based Scheme for Privacy Protection in Mobile Edge Computing., , , , , and . Entropy, 25 (11): 1551 (November 2023)Analysis of Abnormal Events in IMS and Research on the Strategy of Detection., , and . CIS, page 712-716. IEEE Computer Society, (2011)Secrecy analysis in D2D-enabled cellular networks against spatially random eavesdroppers., , , , and . WPMC, page 262-267. IEEE, (2016)