From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation., , , и . TSA, стр. 8-16. IEEE, (2016)一种基于动态插桩的JavaScript反事实执行方法 (JavaScript Counterfactual Execution Method Based on Dynamic Instrumentation)., , , , и . 计算机科学, 44 (11): 22-26 (2017)TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices., , , , и . IEEE Trans. Dependable Secur. Comput., 17 (1): 209-222 (2020)Cecoin: A decentralized PKI mitigating MitM attacks., , , , , и . Future Gener. Comput. Syst., (2020)Network traffic monitoring, analysis and anomaly detection Guest Editorial., , , , и . IEEE Netw., 25 (3): 6-7 (2011)On the fine-grained fingerprinting threat to software-defined networks., , , , , и . Future Gener. Comput. Syst., (2020)Deep Text Classification Can be Fooled., , , , , и . CoRR, (2017)Corrections to "Detecting Bugs by Discovering Expectations and Their Violations"., , , , , и . IEEE Trans. Software Eng., 46 (1): 113 (2020)Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data., , , , , и . AsiaCCS, стр. 393-404. ACM, (2015)MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures., , , , , , , , , и 1 other автор(ы). USENIX Security Symposium, стр. 1165-1182. USENIX Association, (2020)