From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

GENDA: A Graph Embedded Network Based Detection Approach on encryption algorithm of binary program., , , , и . J. Inf. Secur. Appl., (2022)Using Generative Adversarial Networks to Break and Protect Text Captchas., , , , , , , , и . ACM Trans. Priv. Secur., 23 (2): 7:1-7:29 (2020)Semantics-aware obfuscation scheme prediction for binary., , , , , , и . Comput. Secur., (2020)A Generative and Mutational Approach for Synthesizing Bug-Exposing Test Cases to Guide Compiler Fuzzing., , , , , , , и . ESEC/SIGSOFT FSE, стр. 1127-1139. ACM, (2023)A Video-based Attack for Android Pattern Lock., , , , , , и . ACM Trans. Priv. Secur., 21 (4): 19:1-19:31 (2018)Automated conformance testing for JavaScript engines via deep compiler fuzzing., , , , , , , , и . PLDI, стр. 435-450. ACM, (2021)Deep Program Structure Modeling Through Multi-Relational Graph-based Learning., , , , , , и . PACT, стр. 111-123. ACM, (2020)Anonymous, Secure, Traceable, and Efficient Decentralized Digital Forensics., , , , , , , и . IEEE Trans. Knowl. Data Eng., 36 (5): 1874-1888 (мая 2024)Compile-time code virtualization for android applications., , , , , , и . Comput. Secur., (2020)Detecting code vulnerabilities by learning from large-scale open source repositories., , , , , , и . J. Inf. Secur. Appl., (2022)