From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Machine Learning for Software Vulnerability Analysis: A Survey., , , и . DSC, стр. 396-402. IEEE, (2021)A Deep Learning Method to Detect Web Attacks Using a Specially Designed CNN., , , , и . ICONIP (5), том 10638 из Lecture Notes in Computer Science, стр. 828-836. Springer, (2017)An Approach of Code Pointer Hiding Based on a Resilient Area., , и . CBD, стр. 204-209. IEEE, (2019)Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency., , , , и . TrustCom, стр. 1-12. IEEE, (2020)Intelligent Device Identification Method Based on Network Packet Fingerprint., , , и . DSC, стр. 648-653. IEEE, (2021)Multi-dimensional Intelligent Network Asset Identification., , , и . DSC, стр. 595-601. IEEE, (2021)Automatic Smart Device Identification Based on Web Fingerprint and Neural Network., , , , и . BDSIC, стр. 33-41. ACM, (2021)A Hybrid Interface Recovery Method for Android Kernels Fuzzing., , , и . QRS, стр. 335-346. IEEE, (2020)Machine Learning in Vulnerability Databases., , и . ISCID (1), стр. 108-113. IEEE, (2017)Group-based corpus scheduling for parallel fuzzing., , , , , , , , , и . ESEC/SIGSOFT FSE, стр. 1521-1532. ACM, (2022)