Author of the publication

Open the Pod Bay Door: Using Ontology to Understand Instructions.

, and . JOWO, volume 2708 of CEUR Workshop Proceedings, CEUR-WS.org, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Representation of Chinese criminal law in the semantic web., , , and . ICNC-FSKD, page 1676-1680. IEEE, (2016)Securing Internet Applications from Routing Attacks., , , , , , and . CoRR, (2020)Influence of Murder Incident of Ride-hailing Drivers on Ride-hailing User's Consuming Willingness in Nanchang., , , , , and . CoRR, (2020)Securing internet applications from routing attacks., , , , , , and . Commun. ACM, 64 (6): 86-96 (2021)Output Feedback Synthesis for a Two-Agent Nonlinear Microrobotic System., , and . CDC, page 6844-6850. IEEE, (2019)Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks., , , , , and . ACSAC, page 565-579. ACM, (2023)Creating a Secure Underlay for the Internet., , , , , , , , and . USENIX Security Symposium, page 2601-2618. USENIX Association, (2022)Adaptive replanning and control for magnetic microrobots tracking despite unknown blood velocity., , and . CDC, page 1789-1794. IEEE, (2021)Detecting Malware Injection with Program-DNS Behavior., , , , , , , , , and 1 other author(s). EuroS&P, page 552-568. IEEE, (2020)A Prototype Preceding Vehicle Identification System Development and Field Evaluation., , , , , , and . VEHITS, page 444-451. SCITEPRESS, (2024)