From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Review of Data Representation Methods for Vulnerability Mining Using Deep Learning., , , , , , , , и . FCS, том 1558 из Communications in Computer and Information Science, стр. 342-351. Springer, (2021)Cross-Border Data Security from the Perspective of Risk Assessment., , , , , , и . ISPEC, том 14341 из Lecture Notes in Computer Science, стр. 91-104. Springer, (2023)Multimodal Software Defect Severity Prediction Based on Sentiment Probability., , , , , , , и . ISPEC, том 14341 из Lecture Notes in Computer Science, стр. 250-265. Springer, (2023)A fast integer-based batch full-homomorphic encryption scheme over finite field., и . IACR Cryptology ePrint Archive, (2013)Hierarchical Attention Network for Interpretable and Fine-Grained Vulnerability Detection., , , , , , , и . INFOCOM Workshops, стр. 1-6. IEEE, (2022)Vulnerability Dataset Construction Methods Applied To Vulnerability Detection: A Survey., , , , , , , и . DSN Workshops, стр. 141-146. IEEE, (2022)Quantum sealed-bid auction protocol with post-confirmation based on blind signature., , и . Quantum Inf. Process., 23 (3): 70 (марта 2024)Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme., , , , , , , и . Frontiers Comput. Sci., 18 (2): 182815 (апреля 2024)Research on Security Assessment of Cross Border Data Flow., , , , и . FCS, том 1558 из Communications in Computer and Information Science, стр. 327-341. Springer, (2021)