Author of the publication

Locating vulnerabilities in binaries via memory layout recovering.

, , , , , , , and . ESEC/SIGSOFT FSE, page 718-728. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unsupervised Query Segmentation Using Monolingual Word Alignment Method., , and . Computer and Information Science, 5 (1): 13-19 (2012)EEG: Knowledge Base for Event Evolutionary Principles and Patterns., , , and . SMP, volume 774 of Communications in Computer and Information Science, page 40-52. Springer, (2017)An adaptive MLSD receiver using colored noise diversity., and . ISSPA (1), page 29-32. IEEE, (2003)The Comparison of SOM and K-means for Text Clustering., , , , and . Computer and Information Science, 3 (2): 268-274 (2010)Topic Tracking Based on Keywords Dependency Profile., , , , and . AIRS, volume 4993 of Lecture Notes in Computer Science, page 129-140. Springer, (2008)Constructing and Embedding Abstract Event Causality Networks from Text Snippets., , , , , , and . WSDM, page 335-344. ACM, (2017)The Research on Touch Gestures Interaction Design for Personal Portable Computer., , , and . HCC, volume 10745 of Lecture Notes in Computer Science, page 527-537. Springer, (2017)Physical-Layer Security for Mixed η-μ and ℳ-Distribution Dual-Hop RF/FSO Systems., , , and . IEEE Trans. Vehicular Technology, 67 (12): 12427-12431 (2018)Mitigating Stealthy False Data Injection Attacks Against State Estimation in Smart Grid., , , , and . CNS, page 1-9. IEEE, (2018)HC-Search for Incremental Parsing., , , and . IJCAI, page 2887-2893. IJCAI/AAAI Press, (2016)