From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection., , , , и . IEEE Trans. Software Eng., 43 (12): 1157-1177 (2017)Improving sensor network immunity under worm attacks: A software diversity approach., , и . Ad Hoc Networks, (2016)Anonymous Routing., и . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Sensor Code Attestation., и . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)SigFree: A Signature-free Buffer Overflow Attack Blocker., , , и . USENIX Security Symposium, USENIX Association, (2006)AppWatcher: unveiling the underground market of trading mobile app reviews., и . WISEC, стр. 10:1-10:11. ACM, (2015)Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast., , и . Networked Group Communication, том 2816 из Lecture Notes in Computer Science, стр. 107-118. Springer, (2003)Toward Software Diversity in Heterogeneous Networked Systems., , и . DBSec, том 8566 из Lecture Notes in Computer Science, стр. 114-129. Springer, (2014)Replacement Attacks on Behavior Based Software Birthmark., , , , , , и . ISC, том 7001 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2011)Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation., , , , и . CODASPY, стр. 97-108. ACM, (2020)Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020..