Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Heterogeneous Identity Expression and Association Method Based on Attribute Aggregation "In Prepress"., , , and . J. Web Eng., 19 (7-8): 284-302 (2020)Heterogeneous identity trust management method based on risk assessment., , , and . J. Intell. Fuzzy Syst., 41 (3): 4691-4704 (2021)Sense-Based Topic Word Embedding Model for Item Recommendation., , , , , and . IEEE Access, (2019)Internet of Things Monitoring System of Modern Eco-Agriculture Based on Cloud Computing., , , , and . IEEE Access, (2019)Deployment-quality and Accessible Solutions for Cryptography Code Development., , , , , , , , , and . CODASPY, page 174-176. ACM, (2020)Due to the escalation of the COVID-19 situation around the world, CODASPY'20 was postponed to early fall 2020..Multi-location cryptographic code repair with neural-network-based methodologies.. ESEC/SIGSOFT FSE, page 1640-1644. ACM, (2021)CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects., , , , , , , and . CCS, page 2455-2472. ACM, (2019)Neural Cryptanalysis: Metrics, Methodology, and Applications in CPS Ciphers., , and . DSC, page 1-8. IEEE, (2019)Methods and Benchmark for Detecting Cryptographic API Misuses in Python., , , , and . IEEE Trans. Software Eng., 50 (5): 1118-1129 (May 2024)Deep Learning-Based Anomaly Detection in Cyber-Physical Systems: Progress and Opportunities., , , , and . CoRR, (2020)