Author of the publication

Pluto: Exposing Vulnerabilities in Inter-Contract Scenarios.

, , , , , , , , , and . IEEE Trans. Software Eng., 48 (11): 4380-4396 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Topic Sentiment Change Analysis., , and . MLDM, volume 6871 of Lecture Notes in Computer Science, page 443-457. Springer, (2011)A Pedestrian Detection Method Based on Genetic Algorithm for Optimize XGBoost Training Parameters., , , and . IEEE Access, (2019)Evaluating Login Challenges as aDefense Against Account Takeover., , , , , , and . WWW, page 372-382. ACM, (2019)The national champion in ICT standard competition: evidence from an emerging country.. ISTAS, page 114-120. IEEE, (2005)Resequencing 302 wild and cultivated accessions identifies genes related to domestication and improvement in soybean, , , , , , , , , and 18 other author(s). Nat Biotech, 33 (4): 408--414 (April 2015)Adaptive Dynamic Programming for Stochastic Systems With State and Control Dependent Noise., , and . IEEE Trans. Automat. Contr., 61 (12): 4170-4175 (2016)A Mobile Geo-Communication Dataset for Physiology-Aware DASH in Rural Ambulance Transport., , , , and . MMSys, page 158-163. ACM, (2017)Through Wall Human Detection Under Small Samples Based on Deep Learning Algorithm., , and . IEEE Access, (2018)Machine Learning Based Single-Frame Super-Resolution Processing for Lensless Blood Cell Counting., , , , , , , , and . Sensors, 16 (11): 1836 (2016)Building virtual network for high-tech industry clusters: lessons from China., and . Int. J. Netw. Virtual Organisations, 11 (1): 77-94 (2012)