Author of the publication

Staged Method of Code Similarity Analysis for Firmware Vulnerability Detection.

, , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new access control method for semantic web services based on security control center., , and . ICNC, page 3711-3714. IEEE, (2010)A Privacy Filtering and Processing Model in Cloud Computing., , , and . ISCID (1), page 182-187. IEEE, (2016)Application of Mobile Cloud Computing in Operational Command Training Simulation System., , and . CIT, page 532-535. IEEE Computer Society, (2012)SO-RTI: A new RTI based on web services., , , and . ICAL, page 321-326. IEEE, (2012)RFID technology in victory judgement of military exercises., , , and . ICAL, page 390-394. IEEE, (2012)An ArcObjects-based approach to rapid application development of GIS., , and . ICAL, page 411-414. IEEE, (2012)云计算环境下隐私数据的隐式攻击保护 (Privacy Protection from Implicit Attacks in Cloud Computing Environment)., , , and . 计算机科学, 43 (9): 184-187 (2016)Staged Method of Code Similarity Analysis for Firmware Vulnerability Detection., , , and . IEEE Access, (2019)Standard Model Establishment of TCM Syndrome Differentiation of Type 2 Diabetes Based on Data-Mining., , , and . ISDA, page 747-754. IEEE Computer Society, (2007)云数据在数据挖掘中的隐私保护 (Privacy Protection under Cloud Computing against Data Mining)., , , and . 计算机科学, 43 (5): 113-116 (2016)