Author of the publication

VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities.

, , , , , , and . IJCAI, page 4665-4671. ijcai.org, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Multimodal Image Registration and Fusion Methodology Applied to Drug Discovery Research., , , , and . MMSP, page 324-327. IEEE, (2007)hGuard: A Framework to Measure Hypervisor Critical Files., , , , and . SERE (Companion), page 176-181. IEEE, (2013)A Novel Security Scheme for Online Banking Based on Virtual Machine., , and . SERE (Companion), page 12-17. IEEE, (2012)Vulnerability Detection of Android System in Fuzzing Cloud., , , , and . IEEE CLOUD, page 954-955. IEEE, (2013)Efficient and Automatic Instrumentation for Packed Binaries., , and . ISA, volume 5576 of Lecture Notes in Computer Science, page 307-316. Springer, (2009)EpCom: A parallel community detection approach for epidemic diffusion over social networks., , , , and . BIBM, page 1607-1614. IEEE Computer Society, (2017)Characterizing the spatio-temporal burstiness of storage workloads., , , , and . CloudDP@EuroSys, page 2:1-2:6. ACM, (2015)Sparkle: adaptive sample based scheduling for cluster computing., , , , , and . CloudDP@EuroSys, page 5:1-5:6. ACM, (2015)Teaching Machines to Ask Questions., , , , and . IJCAI, page 4546-4552. ijcai.org, (2018)Baggy Bounds with Accurate Checking., , , , and . ISSRE Workshops, page 195-200. IEEE Computer Society, (2012)