Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Heterogeneous Identity Expression and Association Method Based on Attribute Aggregation "In Prepress"., , , and . J. Web Eng., 19 (7-8): 284-302 (2020)Heterogeneous identity trust management method based on risk assessment., , , and . J. Intell. Fuzzy Syst., 41 (3): 4691-4704 (2021)Sense-Based Topic Word Embedding Model for Item Recommendation., , , , , and . IEEE Access, (2019)Internet of Things Monitoring System of Modern Eco-Agriculture Based on Cloud Computing., , , , and . IEEE Access, (2019)Multi-location cryptographic code repair with neural-network-based methodologies.. ESEC/SIGSOFT FSE, page 1640-1644. ACM, (2021)Deployment-quality and Accessible Solutions for Cryptography Code Development., , , , , , , , , and . CODASPY, page 174-176. ACM, (2020)Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020..Neural Cryptanalysis: Metrics, Methodology, and Applications in CPS Ciphers., , and . DSC, page 1-8. IEEE, (2019)CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects., , , , , , , and . CCS, page 2455-2472. ACM, (2019)Dynamic Modelling and Numerical Simulation of Formation Control for Intelligent Multi-agent System with Target Geometric Configuration., and . Appl. Math. Comput., (May 2023)Automatic Detection of Java Cryptographic API Misuses: Are We There Yet?, , , , and . IEEE Trans. Software Eng., 49 (1): 288-303 (2023)