Author of the publication

FMC-CEE: A Collaborative Execution Environment with Flash Memory Controllers in IoT.

, , , , , and . PerCom Workshops, page 88-93. IEEE, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Confidentiality and Integrity Preserving Aggregation Protocol in Wireless Sensor Networks., , , and . Int. J. Distributed Sens. Networks, (2014)Privacy-Preserving and Traceable Federated Learning for data sharing in industrial IoT applications., , , , , and . Expert Syst. Appl., 213 (Part): 119036 (2023)WHGDroid: Effective android malware detection based on weighted heterogeneous graph., , , , , and . J. Inf. Secur. Appl., (September 2023)Detecting anomalous traffic in the controlled network based on cross entropy and support vector machine., , and . IET Inf. Secur., 13 (2): 109-116 (2019)Class Level Research on Modifying Information Transmission Path of the Cooperative Network Based on the Cohesion of Class., , , and . FSDM, volume 299 of Frontiers in Artificial Intelligence and Applications, page 494-510. IOS Press, (2017)A Detecting Method of Array Bounds Defects Based on Symbolic Execution., , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 373-385. Springer, (2017)Optimization of program recursive function calls analysis method., , , , and . Automatic Control and Computer Sciences, 50 (4): 253-259 (2016)An Online Approach to Defeating Return-Oriented-Programming Attacks., , , , and . CSS, volume 10581 of Lecture Notes in Computer Science, page 236-247. Springer, (2017)A Novel Malware Detection Approach Based on Behavioral Semantic Analysis and LSTM Model., , and . ICCT, page 339-343. IEEE, (2021)A Practical Method to Confine Sensitive API Invocations on Commodity Hardware., , , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 145-159. Springer, (2017)