Author of the publication

Cerebro: context-aware adaptive fuzzing for effective vulnerability detection.

, , , , , , , and . ESEC/SIGSOFT FSE, page 533-544. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distributed and morphological operation-based data collection algorithm., , , and . IJDSN, (2017)The segmentation of bones in pelvic CT images based on extraction of key frames., , , , , and . BMC Medical Imaging, 18 (1): 18:1-18:14 (2018)Dynamic Conformational Change Regulates the Protein-DNA Recognition: An Investigation on Binding of a Y-Family Polymerase to Its Target DNA., , , , , , , and . PLoS Computational Biology, (2014)Self-adaptive network architecture reconfiguration in CRNs: demo., , , and . MobiHoc, page 355-356. ACM, (2016)A 14-bit 2-GS/s DAC with a programmable interpolation filter., , , and . ASICON, page 1-4. IEEE, (2015)Vultron: catching vulnerable smart contracts once and for all., , , , and . ICSE (NIER), page 1-4. IEEE / ACM, (2019)New dynamics coined in a 4-D quadratic autonomous hyper-chaotic system., and . Applied Mathematics and Computation, (2019)Oracle-Supported Dynamic Exploit Generation for Smart Contracts., , , , , and . CoRR, (2019)Cooperative Spectrum Sensing in Cognitive Radio under Noise Uncertainty., , , and . VTC Spring, page 1-5. IEEE, (2010)Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics Analysis., , , and . Trustcom/BigDataSE/ISPA, page 1054-1060. IEEE, (2016)