Author of the publication

Categorizing and Predicting Invalid Vulnerabilities on Common Vulnerabilities and Exposures.

, , , , and . APSEC, page 345-354. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Robust Registration and Detection Method for Color Seal Verification., and . ICIC (1), volume 3644 of Lecture Notes in Computer Science, page 97-106. Springer, (2005)Robust 3D Face Recognition by Using Shape Filtering., and . BMVC, page 1-11. British Machine Vision Association, (2010)ESM2-Tree: An maintenance efficient authentication data structure in blockchain., , , , and . SSDBM, page 7:1-7:12. ACM, (2023)On the Practicality of Motion Based Keystroke Inference Attack., and . TRUST, volume 7344 of Lecture Notes in Computer Science, page 273-290. Springer, (2012)Blockchain in China., , , , and . Commun. ACM, 64 (11): 88-93 (2021)TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion., and . HotSec, USENIX Association, (2011)Application of Adaptive Sub-band Filters on Active Noise Control., , , and . SPML, page 106-111. ACM, (2022)Description of Configuration Transformation Matrix of Reconfigurable Mechanism and Automatic Retrieval and Recognition of Motion Mode., , and . ICIRA (9), volume 14275 of Lecture Notes in Computer Science, page 110-123. Springer, (2023)Phalanx: A Practical Byzantine Ordered Consensus Protocol., , , and . CoRR, (2022)Defending against sensor-sniffing attacks on mobile phones., , and . MobiHeld, page 31-36. ACM, (2009)