Author of the publication

Study on Binary Code Evolution with Concrete Semantic Analysis.

, , , , and . ICPCSEE (2), volume 1452 of Communications in Computer and Information Science, page 30-43. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constraint Handling in NSGA-II for Solving Optimal Testing Resource Allocation Problems., , , , , and . IEEE Trans. Reliability, 66 (4): 1193-1212 (2017)On accurate orientation extraction and appropriate distance measure for low-resolution palmprint recognition., , and . Pattern Recognit., 44 (4): 964-972 (2011)A power-type varying gain discrete-time recurrent neural network for solving time-varying linear system., , , , , and . Neurocomputing, (2020)Machine learning approaches for risk assessment of peripherally inserted Central catheter-related vein thrombosis in hospitalized patients with cancer., , , , , , , , , and 1 other author(s). Int. J. Medical Informatics, (2019)ACD: An Adaptable Approach for RFID Cloning Attack Detection., , and . Sensors, 20 (8): 2378 (2020)Inferring Ancestral Chloroplast Genomes with Inverted Repea., , , , and . BIOCOMP, page 75-81. CSREA Press, (2006)SNR-Constrained Heuristics for Optimizing the Scaling Parameter of Robust Audio Watermarking., , , , , and . IEEE Trans. Multim., 20 (10): 2631-2644 (2018)Nonparametric estimation of nonautonomous uncertain differential equations with application to temperature models., , and . J. Intell. Fuzzy Syst., 46 (3): 7273-7281 (March 2024)Strategic complements in two stage, 2 × 2 games., and . J. Econ. Theory, (2020)Detection of RFID cloning attacks: A spatiotemporal trajectory data stream-based practical approach., , , , and . Comput. Networks, (2021)