Author of the publication

Cryptographic Algorithms Analysis Technology Research Based on Functions Signature Recognition.

, , , and . CIS, page 499-504. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An optimal policy for a single-vendor and a single-buyer integrated system with setup cost reduction and process-quality improvement., and . Int. J. Systems Science, 45 (5): 1242-1252 (2014)A Method for Resume Information Extraction Using BERT-BiLSTM-CRF., , , and . ICCT, page 1437-1442. IEEE, (2021)Cryptographic Algorithms Analysis Technology Research Based on Functions Signature Recognition., , , and . CIS, page 499-504. IEEE Computer Society, (2014)BiN: A Two-Level Learning-Based Bug Search for Cross-Architecture Binary., , , and . IEEE Access, (2019)Protocol Reverse-Engineering Methods and Tools: A Survey., , , and . Comput. Commun., (2022)Wetrp: A Platform for Recording of Windows Program Execution Traces., , , and . ISCSCT (1), page 621-625. IEEE Computer Society, (2008)A Process Model for Forensic Analysis of Symbian Smart Phones., , , , and . FGIT-ASEA, volume 59 of Communications in Computer and Information Science, page 86-93. Springer, (2009)spotFuzzer: Static Instrument and Fuzzing Windows COTs., , , , and . CoRR, (2022)Ewap: Using Symbolic Execution to Exploit Windows Applications., , and . CSIE (7), page 733-738. IEEE Computer Society, (2009)Competition, cooperation, and performance: an empirical investigation of Chinese online sellers., , and . Inf. Syst. E-Business Management, 16 (4): 743-760 (2018)