Author of the publication

An Android System Vulnerability Risk Evaluation Method for Heap Overflow.

, , , and . ES, page 89-96. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Monitoring patterns of urban heat islands of the fast-growing Shanghai metropolis, China: Using time-series of Landsat TM/ETM+ data., , and . Int. J. Appl. Earth Obs. Geoinformation, (2012)Identifying Actionable Serial Correlations in Financial Markets., , , , , and . Frontiers Appl. Math. Stat., (2021)The basin of attraction of the Chen attractor, , and . Chaos, Solitons & Fractals, 34 (5): 1696--1703 (December 2007)Periodic Topology Optimization of a Stacker Crane., , , , and . IEEE Access, (2019)Network resource allocation for competing multiple description transmissions., , , , and . IEEE Trans. Commun., 58 (5): 1493-1504 (2010)Network Resource Allocation for Competing Multiple Description Transmissions., , , , and . GLOBECOM, page 2366-2371. IEEE, (2008)Efficient Semantic Enrichment Process for Spatiotemporal Trajectories in Geospatial Environment., , , , , and . APWeb/WAIM (2), volume 12318 of Lecture Notes in Computer Science, page 342-350. Springer, (2020)Adaptive Backstepping Control for Piezoelectric Micro Actuating System with Input Saturation., and . ICARM, page 288-293. IEEE, (2020)Phase Resetting Reveals Network Dynamics Underlying a Bacterial Cell Cycle., , , , and . PLoS Comput. Biol., (2012)Quantize-and-Forward Strategy for Interleave-Division Multiple-Access Relay Channel., , , and . IEEE Trans. Veh. Technol., 65 (3): 1808-1814 (2016)