Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps., , , and . IJDSN, (2019)ARM Static Library Identification Framework., , and . J. Softw., 5 (10): 1099-1106 (2010)DUEN: Dynamic ensemble handling class imbalance in network intrusion detection., , , , and . Expert Syst. Appl., 229 (Part A): 120420 (November 2023)FA-Fuzz: A Novel Scheduling Scheme Using Firefly Algorithm for Mutation-Based Fuzzing., , , , , , and . IEEE Trans. Software Eng., 50 (1): 1-15 (January 2024)基于热例程的动态二进制翻译优化 (Hot-routine Based Optimization of Dynamic Binary Translation)., , , , and . 计算机科学, 43 (5): 27-33 (2016)A Multi-level Perception Security Model Using Virtualization., , , and . KSII Trans. Internet Inf. Syst., 12 (11): 5588-5613 (2018)Ultra High Throughput Implementations for MD5 Hash Algorithm on FPGA., , , and . HPCA (China), volume 5938 of Lecture Notes in Computer Science, page 433-441. Springer, (2009)Determining the base address of MIPS firmware based on absolute address statistics and string reference matching., , , and . Comput. Secur., (2020)Multiclass Classification-Based Side-Channel Hybrid Attacks on Strong PUFs., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)An Effective Usage and Access Control Scheme for Preventing Permission Leak in a Trusted Execution Environment., , , , and . ICCNS, page 6-10. ACM, (2016)