Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Polymorphic Exploit Generation for Software Vulnerabilities., , , , , and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 216-233. Springer, (2013)ORIGEN: Automatic Extraction of Offset-Revealing Instructions for Cross-Version Memory Analysis., , , , and . AsiaCCS, page 11-22. ACM, (2016)Reduction of Kinematic Short Baseline Multipath Effects Based on Multipath Hemispherical Map., , , , , , , , and . Sensors, 16 (10): 1677 (2016)MSABMS-based approach of detecting LDoS attack., , , and . Computers & Security, 31 (4): 402-417 (2012)Multi-sensor fusion based intelligent sensor relocation for health and safety monitoring in BSNs., , , , and . Information Fusion, (2020)L0 Gradient Regularized Low-Rank Tensor Model for Hyperspectral Image Denoising., , and . WHISPERS, page 1-6. IEEE, (2019)Simulation and exergoeconomic analysis of a dual-gas sourced polygeneration process with integrated methanol/DME/DMC catalytic synthesis., , , , and . Comput. Chem. Eng., 35 (9): 1857-1862 (2011)SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh., , , , , , , , , and . CoRR, (2021)Advanced Sidereal Filtering for Mitigating Multipath Effects in GNSS Short Baseline Positioning., , , , , and . ISPRS Int. J. Geo-Information, 7 (6): 228 (2018)Energy Balanced Dispatch of Mobile Edge Nodes for Confident Information Coverage Hole Repairing in IoT., , , , , and . IEEE Internet of Things Journal, 6 (3): 4782-4790 (2019)