Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The new threat to internet: DNP attack with the attacking flows strategizing technology., , , , , and . Int. J. Commun. Syst., 28 (6): 1126-1139 (2015)Parameter Pollution Vulnerabilities Detection Study Based on Tree Edit Distance., , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 392-399. Springer, (2012)NeuFuzz: Efficient Fuzzing With Deep Neural Network., , , and . IEEE Access, (2019)Stealthy Attack Against Redundant Controller Architecture of Industrial Cyber-Physical System., , , , , and . IEEE Internet Things J., 6 (6): 9783-9793 (2019)Towards Comprehensively Understanding the Run-time Security of Programmable Logic Controllers: A 3-year Empirical Study., , , , , , , and . CoRR, (2022)A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks., , , and . KSII Trans. Internet Inf. Syst., 11 (2): 846-864 (2017)EPfuzzer: Improving Hybrid Fuzzing with Hardest-to-reach Branch Prioritization., , , and . KSII Trans. Internet Inf. Syst., 14 (9): 3885-3906 (2020)Siamese Generative Adversarial Predicting Network for Extremely Sparse Data in Recommendation System., , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 1236-1241. IEEE, (2021)The Optimization in News Search Engine Using Formal Concept Analysis., , , , , and . FSKD (2), page 45-49. IEEE Computer Society, (2007)0-7695-2874-0.An Efficient Method to Transform SAT problems to Binary Integer Linear Programming Problem., , , , , and . CoRR, (2018)