Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PDG2Vec: Identify the Binary Function Similarity with Program Dependence Graph., , , , and . QRS, page 537-548. IEEE, (2022)A Survey of Cloudlet Based Mobile Computing., , , , and . CCBD, page 268-275. IEEE Computer Society, (2015)Towards QoS-Aware Cloud Live Transcoding: A Deep Reinforcement Learning Approach., , , , and . ICME, page 670-675. IEEE, (2019)Understanding Performance of Edge Prefetching., , , , and . MMM (1), volume 10132 of Lecture Notes in Computer Science, page 527-539. Springer, (2017)Automated Crash Analysis and Exploit Generation with Extendable Exploit Model., , , , , and . DSC, page 71-78. IEEE, (2022)Memory System Design for a Multi-core Processor., , , , , , and . CISIS, page 601-606. IEEE Computer Society, (2008)CP-operated dash caching via reinforcement learning., , , , and . ICME, page 487-492. IEEE Computer Society, (2017)Tiyuntsong: A Self-Play Reinforcement Learning Approach for ABR Video Streaming., , , , , and . ICME, page 1678-1683. IEEE, (2019)Hierarchical memory system design for a heterogeneous multi-core processor., , , , , , and . SAC, page 1504-1508. ACM, (2008)Automated Vulnerability Discovery System Based on Hybrid Execution., , , , , and . DSC, page 234-241. IEEE, (2022)