From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Reducing Test Cases with Attention Mechanism of Neural Networks., , , , , , , и . USENIX Security Symposium, стр. 2075-2092. USENIX Association, (2021)Analyzing network protocol binary software with joint symbolic execution., , , , , и . ICSAI, стр. 738-742. IEEE, (2016)A Large-scale Parallel Fuzzing System., , и . ICAIP, стр. 194-197. ACM, (2018)Predicting buffer overflow using semi-supervised learning., , , и . CISP-BMEI, стр. 1959-1963. IEEE, (2016)CapSan-UB: Bug Capabilities Detector Based on Undefined Behavior., , , и . ICCNS, стр. 6-11. ACM, (2023)Testing Network Protocol Binary Software with Selective Symbolic Execution., , , , , и . CIS, стр. 318-322. IEEE Computer Society, (2016)Locating Vulnerability in Binaries Using Deep Neural Networks., , , , и . IEEE Access, (2019)Evocatio: Conjuring Bug Capabilities from a Single PoC., , , , , , , , и . CCS, стр. 1599-1613. ACM, (2022)A Steganographic Algorithm for Hiding Data in PDF Files Based on Equivalent Transformation., , , , и . ISIP, стр. 417-421. IEEE Computer Society, (2008)Low Complexity Variational Bayes Iterative Receiver for MIMO-OFDM Systems., , , , и . ICC, стр. 1-5. IEEE, (2009)