Author of the publication

Static Analysis of the Disassembly against Malicious Code Obfuscated with Conditional Jumps.

, , , and . ACIS-ICIS, page 525-530. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Explicit representation of protein activity states significantly improves causal discovery of protein phosphorylation networks., , , and . BMC Bioinform., 21-S (13): 379 (2020)Potential Contributors to Common Mode Error in Array GPS Displacement Fields in Taiwan Island., , , , and . Remote. Sens., 13 (21): 4221 (2021)Substrate Testing on a Multi-Site/Multi-Probe ATE., and . J. Electron. Test., 24 (1-3): 193-201 (2008)Manufacturing yield of QCA circuits by synthesized DNA self-assembled templates., , , and . ACM Great Lakes Symposium on VLSI, page 275-280. ACM, (2010)Analysis on the Fault Trend of Elevator surface damage of Civil Aircraft Flight Control System., , , , and . ICPHM, page 1-8. IEEE, (2018)Tag2Gauss: Learning Tag Representations via Gaussian Distribution in Tagged Networks., , , , , , and . IJCAI, page 3799-3805. ijcai.org, (2019)Denoising Speech Based on Deep Learning and Wavelet Decomposition., , , and . Sci. Program., (2021)Leveraging LLMs for KPIs Retrieval from Hybrid Long-Document: A Comprehensive Framework and Dataset., , , , , , , , and . CoRR, (2023)A Backward identification Problem for an Axis-Symmetric fractional diffusion equation., and . Math. Model. Anal., 22 (3): 311-320 (2017)LEReg: Empower Graph Neural Networks with Local Energy Regularization., , and . CIKM, page 1191-1201. ACM, (2021)