Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure beamforming for cognitive cyber-physical systems based on cognitive radio with wireless energy harvesting., , , , and . Ad Hoc Networks, (2018)Memetic-based schedule synthesis for communication on time-triggered embedded systems., , , , , and . IJDSN, (2017)Hypergraph Learning With Cost Interval Optimization., , , , , and . AAAI, page 4522-4529. AAAI Press, (2018)Industry practice of coverage-guided enterprise Linux kernel fuzzing., , , , , , , , and . ESEC/SIGSOFT FSE, page 986-995. ACM, (2019)VulSeeker-pro: enhanced semantic learning based binary vulnerability seeker with emulation., , , , , and . ESEC/SIGSOFT FSE, page 803-808. ACM, (2018)EVMFuzz: Differential Fuzz Testing of Ethereum Virtual Machine., , , , , and . CoRR, (2019)Task and Participant Scheduling of Trading Platforms in Vehicular Participatory Sensing Networks., , , and . Sensors, 16 (12): 2013 (2016)Hypergraph-Induced Convolutional Networks for Visual Classification., , , , , , and . IEEE Trans. Neural Netw. Learning Syst., 30 (10): 2963-2972 (2019)EVMFuzzer: detect EVM vulnerabilities via fuzz testing., , , , , , , and . ESEC/SIGSOFT FSE, page 1110-1114. ACM, (2019)Lithium-Ion Cell Screening With Convolutional Neural Networks Based on Two-Step Time-Series Clustering and Hybrid Resampling for Imbalanced Data., , , and . IEEE Access, (2018)