From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automatic 3D point cloud registration algorithm based on triangle similarity ratio consistency., , , , и . IET Image Process., 14 (14): 3314-3323 (2020)An Empirical Study on Android Malware Characterization by Social Network Analysis., , , и . IEEE Trans. Reliab., 73 (1): 757-770 (марта 2024)Gamification narrative design as a predictor for mobile fitness app user persistent usage intentions: a goal priming perspective., , , и . Enterp. Inf. Syst., 15 (10): 1501-1545 (2021)FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection., , , , , , и . USENIX Security Symposium, USENIX Association, (2024)Towards Understanding the Capability of Large Language Models on Code Clone Detection: A Survey., , , , , , , , , и . CoRR, (2023)Interpreters for GNN-Based Vulnerability Detection: Are We There Yet?, , , , , , и . ISSTA, стр. 1407-1419. ACM, (2023)SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis., , , , , , , и . ASE, стр. 821-833. IEEE, (2020)A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments., , , , , и . ICSE, стр. 12:1-12:13. ACM, (2024)Historical Embedding-Guided Efficient Large-Scale Federated Graph Learning., , , , , , , и . Proc. ACM Manag. Data, 2 (3): 144 (2024)MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis., , , , , и . ASE, стр. 139-150. IEEE, (2019)