Author of the publication

Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency.

, , , , and . TrustCom, page 1-12. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID., , , , and . IEEE/ACM Trans. Netw., 30 (1): 409-422 (2022)基于PCA降维的云资源状态监控数据压缩技术 (Data Dimension Reduction Method Based on PCA for Monitoring Data of Virtual Resources in Cloud Computing)., , , , and . 计算机科学, 43 (8): 19-25 (2016)Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects., , , , and . SP, page 3162-3177. IEEE, (2023)Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency., , , , and . TrustCom, page 1-12. IEEE, (2020)Off-Path TCP Exploits of the Mixed IPID Assignment., , , , and . CCS, page 1323-1335. ACM, (2020)The Side-Channel Vulnerability in Network Protocol., , , and . ICCNS, page 1-8. ACM, (2021)Research on survivability metrics based on survivable process of network system., , , , , and . SIN, page 247-250. ACM, (2011)Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack., , , , , , , and . CoRR, (2024)Traffic Hijacking in Wi-Fi Networks via ICMP Redirects., , , , and . ACM TUR-C, page 141-142. ACM, (2023)A Fixed-Wing UAV Formation Algorithm Based on Vector Field Guidance., , , , , and . IEEE Trans Autom. Sci. Eng., 20 (1): 179-192 (2023)