From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Binary Code Representation With Well-Balanced Instruction Normalization., , , и . IEEE Access, (2023)A Look Back on a Function Identification Problem., , и . ACSAC, стр. 158-168. ACM, (2021)Configuration-Driven Software Debloating., , и . EuroSec@EuroSys, стр. 9:1-9:6. ACM, (2019)Demystifying the Regional Phishing Landscape in South Korea., , , , и . IEEE Access, (2023)Evaluating Password Composition Policy and Password Meters of Popular Websites., , , , и . SP (Workshops), стр. 12-20. IEEE, (2023)Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning., , , и . ACSAC, стр. 361-374. ACM, (2022)Compiler-Assisted Code Randomization., , , , и . IEEE Symposium on Security and Privacy, стр. 461-477. IEEE Computer Society, (2018)ToolPhet: Inference of Compiler Provenance From Stripped Binaries With Emerging Compilation Toolchains., , и . IEEE Access, (2024)Juggling the Gadgets: Binary-level Code Randomization using Instruction Displacement., и . AsiaCCS, стр. 23-34. ACM, (2016)The Politics of Routing: Investigating the Relationship between AS Connectivity and Internet Freedom., , , , , и . FOCI, USENIX Association, (2016)