Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DOPdefender: An approach to thwarting data-oriented programming attacks based on a data-aware automaton., , , , and . Comput. Secur., (2019)An Information Intelligent Search Method for Computer Forensics Based on Text Similarity., , , , and . ICCSP, page 79-83. ACM, (2020)一种基于完整性保护的终端计算机安全防护方法 (Integrity Based Security Protection Method for Terminal Computer)., , and . 计算机科学, 42 (6): 162-166 (2015)Logical acquisition method based on data migration for Android mobile devices., , , and . Digit. Investig., (2018)Computer Evidence Analysis Technology Based on Weighted Frequent Pattern Growth Algorithm., , , , , and . ICAIS (3), volume 11634 of Lecture Notes in Computer Science, page 430-441. Springer, (2019)Research on Security Detection Technology for Internet of Things Terminal Based on Firmware Code Genes., , , , and . IEEE Access, (2020)CP-GAN: A Cross-Pose Profile Face Frontalization Boosting Pose-Invariant Face Recognition., , , and . IEEE Access, (2020)PA-GAN: A Patch-Attention Based Aggregation Network for Face Recognition in Surveillance., , , and . IEEE Access, (2020)一种动态优先级排序的虚拟机I/O调度算法 (I/O Scheduling Algorithm Based on Dynamic Prioritization in Virtual Machines)., , , , and . 计算机科学, 44 (1): 13-19 (2017)Unpaired Domain Transfer for Data Augment in Face Recognition., , , , and . IEEE Access, (2020)