Author of the publication

Cross-Architecture IoT Firmware Similarity Comparison Based on Multi-Layer GCN.

, , , , , , and . ISCC, page 1-7. IEEE, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Potential Risk Detection System of Hyperledger Fabric Smart Contract based on Static Analysis., , , and . ISCC, page 1-7. IEEE, (2021)GE2: A General and Efficient Knowledge Graph Embedding Learning System., , , , , and . Proc. ACM Manag. Data, 2 (3): 183 (2024)LitroACP: A Lightweight and Robust Framework for Extracting Access Control Policies from Specifications., , , , , and . CAiSE (1), volume 15701 of Lecture Notes in Computer Science, page 75-90. Springer, (2025)A deep learning based detection scheme towards DDos Attack in permissioned blockchains., , , , , and . CSCWD, page 2644-2649. IEEE, (2024)Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes., , , , and . Cybersecur., 1 (1): 5 (2018)MixHD: A Method for Detecting Hallucinations Based on the Internal State and Output Probability of Large Language Models., , , , , and . ICASSP, page 1-5. IEEE, (2025)LogBlock: An Anomaly Detection Method on Permissioned Blockchain based on Log-Block Sequence., , , , , , and . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, page 1008-1015. IEEE, (2022)DSP: Efficient GNN Training with Multiple GPUs., , , , , , , and . PPoPP, page 392-404. ACM, (2023)The malicious resource consumption detection in permissioned blockchain based on traffic analysis., , , , , and . CSCWD, page 510-515. IEEE, (2023)DanceFree: A Somatosensory Dance Game Based on 3D Dance Animation Generation Algorithm., , , , , , and . HCI (47), volume 14730 of Lecture Notes in Computer Science, page 323-336. Springer, (2024)