Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Joint Model of Automatic Word Segmentation and Part-Of-Speech Tagging for Ancient Classical Texts Based on Radicals., , , , , and . ALP@RANLP, page 122-132. INCOMA Ltd., Shoumen, Bulgaria / ACL, (2023)An improved lattice IIR digital filter structure., , , , and . ICICS, page 1-5. IEEE, (2011)Software-driven Security Attacks: From Vulnerability Sources to Durable Hardware Defenses., , , , , , , , , and . ACM J. Emerg. Technol. Comput. Syst., 17 (3): 42:1-42:38 (2021)Malware detection using machine learning based analysis of virtual memory access patterns., , , and . DATE, page 169-174. IEEE, (2017)Align-smatch: A Novel Evaluation Method for Chinese Abstract Meaning Representation Parsing based on Alignment of Concept and Relation., , , , , , and . LREC, page 5938-5945. European Language Resources Association, (2022)Design of optimal digital lattice filter structures based on genetic algorithm., , , , and . Signal Process., 92 (4): 989-998 (2012)Performance Degradation Analysis of Railway Vehicle Door System Based on Density Peak Clustering., , , , and . CAA SAFEPROCESS, page 1-6. IEEE, (2021)Trace-based Analysis of Memory Corruption Malware Attacks., , and . Haifa Verification Conference, volume 10629 of Lecture Notes in Computer Science, page 67-82. Springer, (2017)Morpheus: A Vulnerability-Tolerant Secure Architecture Based on Ensembles of Moving Target Defenses with Churn., , , , , , , , , and 3 other author(s). ASPLOS, page 469-484. ACM, (2019)