Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approach to recognizing SSVEP by combining CCA with artificial neural network., , , , , , , , and . ICIAI, page 15-19. ACM, (2020)LearnAFL: Greybox Fuzzing With Knowledge Enhancement., , , , and . IEEE Access, (2019)An Inframarginal Analysis Based Resource Allocation Method in Distributed Computing., , , and . ISPA, page 220-223. IEEE Computer Society, (2010)XHunter: Understanding XXE Vulnerability via Automatic Analysis., , , , and . SecureComm (2), volume 399 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 23-42. Springer, (2021)A Method for SSVEP Recognition Based on Weighted Canonical Correlation Analysis., , , , , , , , , and 2 other author(s). SSCI, page 399-403. IEEE, (2019)EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit., , , , , , and . USENIX Security Symposium, page 2307-2324. USENIX Association, (2020)Game of Hide-and-Seek: Exposing Hidden Interfaces in Embedded Web Applications of IoT Devices., , , , , , , and . WWW, page 524-532. ACM, (2022)A Delay-Based Dynamic Load Balancing Method and Its Stability Analysis and Simulation., , , , and . Euro-Par (1), volume 6271 of Lecture Notes in Computer Science, page 192-203. Springer, (2010)Foot In The Door: Understanding Large Language Model Jailbreaking via Cognitive Psychology., , , , , , and . CoRR, (2024)