Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ARG: Automatic ROP Chains Generation., , , , , , and . IEEE Access, (2019)Co-Attention Hierarchical Network: Generating Coherent Long Distractors for Reading Comprehension., , and . CoRR, (2019)Robust boosting via self-sampling., , and . Knowl. Based Syst., (2020)Locally weighted embedding topic modeling by markov random walk structure approximation and sparse regularization., , , , , and . Neurocomputing, (2018)An Extensive Method to Detect the Image Digital Watermarking Based on the Known Template., , and . PCM, volume 4261 of Lecture Notes in Computer Science, page 31-40. Springer, (2006)A Temporal-Spatial network embedding model for ICT supply chain market trend forecasting., , , , and . Appl. Soft Comput., (2022)A kernel stack protection model against attacks from kernel execution units., , , , and . Comput. Secur., (2018)VD-HEN: Capturing Semantic Dependencies for Source Code Vulnerability Detection With a Hierarchical Embedding Network., , , and . Computer, 56 (10): 49-61 (October 2023)Cloud-based security and privacy-aware information dissemination over ubiquitous VANETs., , , , and . Comput. Stand. Interfaces, (2018)Antibypassing Four-Stage Dynamic Behavior Modeling for Time-Efficient Evasive Malware Detection., , , and . IEEE Trans. Ind. Informatics, 20 (3): 4627-4639 (March 2024)