Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Locally weighted embedding topic modeling by markov random walk structure approximation and sparse regularization., , , , , and . Neurocomputing, (2018)A kernel stack protection model against attacks from kernel execution units., , , , and . Comput. Secur., (2018)Antibypassing Four-Stage Dynamic Behavior Modeling for Time-Efficient Evasive Malware Detection., , , and . IEEE Trans. Ind. Informatics, 20 (3): 4627-4639 (March 2024)VD-HEN: Capturing Semantic Dependencies for Source Code Vulnerability Detection With a Hierarchical Embedding Network., , , and . Computer, 56 (10): 49-61 (October 2023)Cloud-based security and privacy-aware information dissemination over ubiquitous VANETs., , , , and . Comput. Stand. Interfaces, (2018)A Temporal-Spatial network embedding model for ICT supply chain market trend forecasting., , , , and . Appl. Soft Comput., (2022)Co-Attention Hierarchical Network: Generating Coherent Long Distractors for Reading Comprehension., , and . CoRR, (2019)ARG: Automatic ROP Chains Generation., , , , , , and . IEEE Access, (2019)Robust boosting via self-sampling., , and . Knowl. Based Syst., (2020)An Extensive Method to Detect the Image Digital Watermarking Based on the Known Template., , and . PCM, volume 4261 of Lecture Notes in Computer Science, page 31-40. Springer, (2006)