Author of the publication

Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label Classification Model Using CNN-BiLSTM.

, , , , , , and . UbiSec, volume 1768 of Communications in Computer and Information Science, page 52-63. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reliable and Controllable Data Sharing Based on Blockchain., , , , and . UbiSec, volume 1557 of Communications in Computer and Information Science, page 229-240. Springer, (2021)Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine Learning., , , , and . UbiSec, volume 1768 of Communications in Computer and Information Science, page 179-192. Springer, (2022)Application-Oriented Sensor Network Architecture for Dependable Structural Health Monitoring., , , , and . PRDC, page 91-98. IEEE Computer Society, (2015)SDN-Based Secure VANETs Communication with Fog Computing., , , and . SpaCCS, volume 11342 of Lecture Notes in Computer Science, page 46-59. Springer, (2018)Investigation on Unauthorized Human Activity Watching Through Leveraging Wi-Fi Signals., , , and . SpaCCS, volume 11342 of Lecture Notes in Computer Science, page 511-521. Springer, (2018)A Privacy-Preserving Attribute-Based Access Control Scheme., , , , , and . SpaCCS, volume 11342 of Lecture Notes in Computer Science, page 361-370. Springer, (2018)FABAC: A Flexible Fuzzy Attribute-Based Access Control Mechanism., , , , , and . SpaCCS, volume 10656 of Lecture Notes in Computer Science, page 332-343. Springer, (2017)An Effective Trust Establishment Scheme for Authentication in Mobile Ad Hoc Networks., , , and . CIT, page 749-754. IEEE Computer Society, (2007)A Novel Link-Segment Storage and Query Scheme for Object Tracking Applications in Wireless Sensor Networks., , and . ICYCS, page 545-551. IEEE Computer Society, (2008)Integer Programming Scheme for Target Coverage in Heterogeneous Wireless Sensor Networks., , and . MSN, page 79-84. IEEE Computer Society, (2010)