From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fully Context-Sensitive CFI for COTS Binaries., , , , , и . ACISP (2), том 10343 из Lecture Notes in Computer Science, стр. 435-442. Springer, (2017)A Secure High-Order Lanczos-Based Orthogonal Tensor SVD for Big Data Reduction in Cloud Environment., , , , и . IEEE Trans. Big Data, 5 (3): 355-367 (2019)CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers., , , , , и . WISEC, стр. 6:1-6:6. ACM, (2015)Theory and methodology of research on cloud security., , и . Sci. China Inf. Sci., 59 (5): 050105:1-050105:3 (2016)A Secure, Usable, and Transparent Middleware for Permission Managers on Android., , , , , и . IEEE Trans. Dependable Secur. Comput., 14 (4): 350-362 (2017)RT-Grid: A QoS Oriented Service Grid Framework., , , и . PDCAT, том 3320 из Lecture Notes in Computer Science, стр. 345-348. Springer, (2004)A Scalable Service Scheme for Secure Group Communication in Grid., , , , и . COMPSAC (1), стр. 31-38. IEEE Computer Society, (2007)A Trusted Group Signature Architecture in Virtual Computing Environment., , , и . ATC, том 5060 из Lecture Notes in Computer Science, стр. 73-85. Springer, (2008)TreeCen: Building Tree Graph for Scalable Semantic Code Clone Detection., , , , , и . ASE, стр. 109:1-109:12. ACM, (2022)Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree., , , , , , и . ISSTA, стр. 89-100. ACM, (2023)