Author of the publication

Detecting unknown vulnerabilities in smart contracts using opcode sequences.

, , , , and . Connect. Sci., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GFL-ALDPA: a gradient compression federated learning framework based on adaptive local differential privacy budget allocation., , , , , and . Multim. Tools Appl., 83 (9): 26349-26368 (March 2024)On robustness of the full implication triple I inference method with respect to finer measurements., and . Int. J. Approx. Reason., 55 (3): 787-796 (2014)Cryptanalysis and Improvement on an Image Encryption Algorithm Design Using a Novel Chaos Based S-Box., , and . Symmetry, 10 (9): 399 (2018)Practical distributed secret key generation for delay tolerant networks., and . Concurr. Comput. Pract. Exp., 25 (14): 2067-2079 (2013)Classifying Parkinson's Disease Using Resting State Electroencephalogram Signals and UEN-PDNet., , , , , and . IEEE Access, (2023)cTMvSDN: improving resource management using combination of Markov-process and TDMA in software-defined networking., and . J. Supercomput., 78 (3): 3477-3499 (2022)3D Vehicle Detection With RSU LiDAR for Autonomous Mine., , , and . IEEE Trans. Veh. Technol., 70 (1): 344-355 (2021)In-network generalized trustworthy data collection for event detection in cyber-physical systems., , , and . PeerJ Comput. Sci., (2021)A sub-pixel circle detection algorithm combined with improved RHT and fitting.. Multim. Tools Appl., 79 (39-40): 29825-29843 (2020)Mal-Warehouse: A Data Collection-as-a-Service of Mobile Malware Behavioral Patterns., , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1503-1508. IEEE, (2018)