From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Remote Fingerprinting on Internet-Wide Printers Based on Neural Network., , , , и . GLOBECOM, стр. 1-6. IEEE, (2019)IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol., , , , , , и . ACNS, том 13269 из Lecture Notes in Computer Science, стр. 356-375. Springer, (2022)TaiE: Function Identification for Monolithic Firmware., , , , , и . ICPC, стр. 403-414. ACM, (2024)HoneyVP: A Cost-Effective Hybrid Honeypot Architecture for Industrial Control Systems., , , , и . ICC, стр. 1-6. IEEE, (2021)PowerGuard: Using Power Side-Channel Signals to Secure Motion Controllers in ICS., , , , , , , и . IEEE Trans. Inf. Forensics Secur., (2024)Finding Vulnerabilities in Internal-binary of Firmware with Clues., , , , , , и . ICC, стр. 5397-5402. IEEE, (2022)Concrete Constraint Guided Symbolic Execution., , , , и . ICSE, стр. 122:1-122:12. ACM, (2024)LLM-Enhanced Static Analysis for Precise Identification of Vulnerable OSS Versions., , , , , , , , и . CoRR, (2024)Physical layer spoofing detection based on sparse signal processing and fuzzy recognition., , , и . IET Signal Process., 11 (5): 640-646 (2017)Detection of cyberattack in Industrial Control Networks using multiple adaptive local kernel learning., , , , , , , , и . Comput. Secur., (2025)