Author of the publication

AMNeuzz: A Strongly Directed Fuzz Testing Method Based on Attention Mechanism.

, , , , , and . ICCDE, page 105-110. ACM, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A key management protocol with robust continuity for sensor networks., , , , and . Comput. Stand. Interfaces, 31 (4): 642-647 (2009)A privacy-aware data dissemination scheme for smart grid with abnormal data traceability., , , and . Comput. Networks, (2017)CIT: A credit-based incentive tariff scheme with fraud-traceability for smart grid., , , , , and . Secur. Commun. Networks, 9 (9): 823-832 (2016)PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI., , , , , and . Future Gener. Comput. Syst., (2019)Querying over Encrypted Data in Smart Grids, , , , and . Springer Briefs in Computer Science Springer, (2014)A Data-Mining Approach for the Validation of Aerosol Retrievals., , , , and . IEEE Geosci. Remote. Sens. Lett., 5 (1): 113-117 (2008)DPB-MA: Low-Latency Message Authentication Scheme Based on Distributed Verification and Priority in Vehicular Ad Hoc Network., , , , and . IEEE Trans. Veh. Technol., 72 (4): 5152-5166 (April 2023)Towards Provable Security for Data Transmission Protocols in Sensor Network., , , and . J. Inf. Sci. Eng., 25 (1): 319-333 (2009)Multi-Source Stego Detection with Low-Dimensional Textural Feature and Clustering Ensembles., , , , and . Symmetry, 10 (5): 128 (2018)Classification of Malicious Software Behaviour Detection with Hybrid Set Based Feed Forward Neural Network., , , , and . ISNN (2), volume 6064 of Lecture Notes in Computer Science, page 556-565. Springer, (2010)