Author of the publication

Anonymous, Secure, Traceable, and Efficient Decentralized Digital Forensics.

, , , , , , , and . IEEE Trans. Knowl. Data Eng., 36 (5): 1874-1888 (May 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semantics-aware obfuscation scheme prediction for binary., , , , , , and . Comput. Secur., (2020)Using Generative Adversarial Networks to Break and Protect Text Captchas., , , , , , , , and . ACM Trans. Priv. Secur., 23 (2): 7:1-7:29 (2020)GENDA: A Graph Embedded Network Based Detection Approach on encryption algorithm of binary program., , , , and . J. Inf. Secur. Appl., (2022)A Generative and Mutational Approach for Synthesizing Bug-Exposing Test Cases to Guide Compiler Fuzzing., , , , , , , and . ESEC/SIGSOFT FSE, page 1127-1139. ACM, (2023)A Video-based Attack for Android Pattern Lock., , , , , , and . ACM Trans. Priv. Secur., 21 (4): 19:1-19:31 (2018)Deep Program Structure Modeling Through Multi-Relational Graph-based Learning., , , , , , and . PACT, page 111-123. ACM, (2020)Automated conformance testing for JavaScript engines via deep compiler fuzzing., , , , , , , , and . PLDI, page 435-450. ACM, (2021)Anonymous, Secure, Traceable, and Efficient Decentralized Digital Forensics., , , , , , , and . IEEE Trans. Knowl. Data Eng., 36 (5): 1874-1888 (May 2024)Exploiting Code Diversity to Enhance Code Virtualization Protection., , , , , , , and . ICPADS, page 620-627. IEEE, (2018)Detecting code vulnerabilities by learning from large-scale open source repositories., , , , , , and . J. Inf. Secur. Appl., (2022)