Author of the publication

Static Analysis of the Disassembly against Malicious Code Obfuscated with Conditional Jumps.

, , , and . ACIS-ICIS, page 525-530. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Model for NP-based Application Design., , and . PDCAT, page 880-883. IEEE Computer Society, (2005)Analyzing and Recognizing Android Malware via Semantic-Based Malware Gene., , , , , , and . CyberC, page 17-20. IEEE, (2017)Research on the Recovery Technology of Floating-point Parameters in Binary Translation., , , and . IMECS, page 1163-1168. Newswood Limited, (2007)SIMD代码中的向量访存优化研究 (Memory Access Optimization for Vector Program of SIMD Form)., , and . 计算机科学, 42 (12): 18-22 (2015)Research on Semantic Gap Problem of Virtual Machine., , , and . Wirel. Pers. Commun., 97 (4): 5983-6004 (2017)Un-speculation in Modulo Scheduled Loops., , and . IMSCCS, page 486-489. IEEE Computer Society, (2007)Selection-Channel-Aware Scale Co-occurrence Matrix Feature to Detect Content-Adaptive JPEG Steganography., , and . CSAI/ICIMT, page 375-379. ACM, (2018)Using Ensemble Learning to Improve Automatic Vectorization of Tensor Contraction Program., , and . IEEE Access, (2018)循环展开技术在向量程序中的应用 (Loop Unrolling in Vectorized Programs)., , , and . 计算机科学, 43 (1): 226-231 (2016)SIMD向量指令的非满载使用方法研究 (Research on Non-full Length Usage of SIMD Vector Instruction)., , and . 计算机科学, 42 (7): 229-233 (2015)