Author of the publication

A controllable historical message playback method and application of message middleware.

, , and . CSSE, page 43-48. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Generative Adversarial Network for AI-Aided Chair Design., , and . CoRR, (2020)Decompiling x86 Deep Neural Network Executables., , , , and . USENIX Security Symposium, page 7357-7374. USENIX Association, (2023)CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software., , and . USENIX Security Symposium, page 2009-2026. USENIX Association, (2023)Metamorphic Testing of Deep Learning Compilers., , , , and . SIGMETRICS (Abstracts), page 65-66. ACM, (2022)Design of Resonant Cavity Based Sensor for High-Temperature Blade Tip Clearance Measurement., , , and . ICSPCC, page 1-5. IEEE, (2021)Improved Minimal Harmonic Injection PWM Strategy for Dual-Three-Phase Permanent Magnet Synchronous Motors in the Overmodulation Region., , , , and . IECON, page 1-6. IEEE, (2022)Direct-axis Dead-time Effect Compensation Strategy Based on Adaptive Linear Neuron Method for PMSM Drives., , , , , and . IECON, page 1-6. IEEE, (2022)A controllable historical message playback method and application of message middleware., , and . CSSE, page 43-48. ACM, (2021)Metamorphic Shader Fusion for Testing Graphics Shader Compilers., , and . ICSE, page 2400-2412. IEEE, (2023)Deep Reinforcement Learning for Network Security Applications With A Safety Guide., , , , , and . ICCC, page 1-6. IEEE, (2023)