Author of the publication

Replacement attacks: automatically evading behavior-based software birthmark.

, , , , , , and . Int. J. Inf. Sec., 11 (5): 293-304 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The performance of nonlinear vibration control via NiTiNOL-Steel wire ropes., , , and . Commun. Nonlinear Sci. Numer. Simul., (April 2023)Regression and Learning with Pixel-wise Attention for Retinal Fundus Glaucoma Segmentation and Detection., and . CoRR, (2020)Energy-Efficient RAR3 Password Recovery with Dual-Granularity Data Path Strategy., , , and . ISCAS, page 1-5. IEEE, (2019)An Improved On-chip Debug Architecture for SPARC Processor based on Shadow Scan Technique., , and . PECCS, page 441-444. SciTePress, (2011)Development and Application of MES Based on Cloud Platform for Steel Structure Enterprises., , , , , , , and . IEEM, page 521-525. IEEE, (2019)Simultaneous input and state estimation for stochastic nonlinear systems with additive unknown inputs., , , and . Autom., (2020)High-Speed Railway EMUs' Circulation Plan Optimization: A Two-Stage Optimization Algorithm Based on Column Generation., , , , and . IEEE Access, (2020)Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems"., , and . Secur. Commun. Networks, 6 (12): 1522-1523 (2013)Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes., , , and . Secur. Commun. Networks, 6 (5): 612-630 (2013)A Wireless Sensor Network for Monitoring Environmental Quality in the Manufacturing Industry., , , and . IEEE Access, (2019)