Autor der Publikation

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Partial-SMT: Core-scheduling Protection Against SMT Contention-based Attacks., , , , , , и . TrustCom, стр. 378-385. IEEE, (2020)A capacity self-adaption information hiding algorithm based on RS code., , , , , и . MFI, стр. 1-8. IEEE, (2014)A Method of Handling Control Dependence in Dynamic Taint Analysis., , и . CIT/IUCC/DASC/PICom, стр. 417-422. IEEE, (2015)An encryption algorithm of JPEG2000 streams for supporting ciphertext-based transcoding., , , и . MFI, стр. 1-7. IEEE, (2014)A dynamic marking method for implicit information flow in dynamic taint analysis., , и . SIN, стр. 275-282. ACM, (2015)An Uneven Distributed System for Dynamic Taint Analysis Framework., , , и . CSCloud, стр. 237-240. IEEE Computer Society, (2015)Analysis and Design on Key Updating Policies for Satellite Networks., , и . Int. J. Comput. Commun. Control, 3 (4): 343-352 (2008)Contextual Insight: Detecting Abnormal Device Behaviors in IoT Systems., , , , и . CSCWD, стр. 1268-1273. IEEE, (2024)Survey on Privacy Protection of Android Devices., , , и . CSCloud, стр. 241-246. IEEE Computer Society, (2015)Joint FEC codes and hash chains for optimizing authentication of JPEG2000 image streaming., , , и . ICME, стр. 1-6. IEEE Computer Society, (2013)