Author of the publication

An analysis on secure coding using symbolic execution engine.

, , and . J. Comput. Virol. Hacking Tech., 12 (3): 177-184 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid Neural Networks for Human Activity Recognition in Video., and . IC-AI, page 397-401. CSREA Press, (2010)Antecedents influencing SNS addiction and exhaustion (fatigue syndrome): focusing on six countries., , and . Behav. Inf. Technol., 42 (15): 2601-2625 (November 2023)A Feature Saliency Measure in WFMM Neural Network-Based Pattern Classification., , and . IC-AI, page 202-207. CSREA Press, (2005)Full chip integration of 3-d cross-point ReRAM with leakage-compensating write driver and disturbance-aware sense amplifier., , , , , , , , , and 2 other author(s). VLSI Circuits, page 1-2. IEEE, (2016)Embedded Real-Time Fall Detection Using Deep Learning For Elderly Care., , , and . CoRR, (2017)Remote Pulse Rate Measurement From Near-Infrared Videos., , , , and . IEEE Signal Process. Lett., 25 (8): 1271-1275 (2018)An analysis on secure coding using symbolic execution engine., , and . J. Comput. Virol. Hacking Tech., 12 (3): 177-184 (2016)Feature Selection for Specific Antibody Deficiency Syndrome by Neural Network with Weighted Fuzzy Membership Functions., , , and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 811-820. Springer, (2005)Human Action Recognition Using a Modified Convolutional Neural Network., , and . ISNN (2), volume 4492 of Lecture Notes in Computer Science, page 715-723. Springer, (2007)One-Shot Manipulation of Entanglement for Quantum Channels., , , and . IEEE Trans. Inf. Theory, 67 (8): 5339-5351 (2021)