Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Control Flow Obfuscation Using Neural Network to Fight Concolic Testing., , , , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 287-304. Springer, (2014)MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks., , , , and . J. Internet Serv. Inf. Secur., 4 (1): 25-36 (2014)Reliable Password Hardening Service with Opt-Out., , and . SRDS, page 250-261. IEEE, (2022)A Typical Set Method of Intrusion Detection Technology Base on Computer Audit Data., , and . CIS, page 687-691. IEEE Computer Society, (2007)Performance Evaluation of a Collaborative Intrusion Detection System., and . ICNC (6), page 409-413. IEEE Computer Society, (2009)Linear Obfuscation to Combat Symbolic Execution., , , and . ESORICS, volume 6879 of Lecture Notes in Computer Science, page 210-226. Springer, (2011)Software Watermarking Using Support Vector Machines., and . COMPSAC, page 533-542. IEEE Computer Society, (2015)Stochastic single machine scheduling with earliness and tardiness penalties and proportional weights.. ACC, page 4455-4456. IEEE, (2002)Stochastic single machine scheduling with proportional job weights to minimize deviations of completion times from a common due date.. CDC, page 5124-5127. IEEE, (2003)Password Guessing via Neural Language Modeling., , , , and . ML4CS, volume 11806 of Lecture Notes in Computer Science, page 78-93. Springer, (2019)