Author of the publication

Verifying RTuinOS using VCC: From approach to practice.

, , , , and . SNPD, page 373-378. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Liang, Hongliang
add a person with the name Liang, Hongliang
 

Other publications of authors with the same name

PAPDroid: Personalization Awareness Privacy Protection in Android., , , , and . IIKI, page 122-125. IEEE, (2015)Seml: A Semantic LSTM Model for Software Defect Prediction., , , and . IEEE Access, (2019)EAdroid: Providing Environment Adaptive Security for Android System., , , and . Inscrypt, volume 8567 of Lecture Notes in Computer Science, page 118-131. Springer, (2013)Security On-demand Architecture with Multiple Modules Support., , , , , and . ISPEC, volume 3439 of Lecture Notes in Computer Science, page 121-131. Springer, (2005)Deep Learning With Customized Abstract Syntax Tree for Bug Localization., , , and . IEEE Access, (2019)Verifying RTuinOS using VCC: From approach to practice., , , , and . SNPD, page 373-378. IEEE Computer Society, (2016)Aurora: Providing Trusted System Services for Enclaves On an Untrusted System., , , , , and . CoRR, (2018)A New Pre-copy Strategy for Live Migration of Virtual Machines., , , and . IIKI, page 54-59. IEEE Computer Society, (2016)Sequence coverage directed greybox fuzzing., , , , and . ICPC, page 249-259. IEEE / ACM, (2019)JavaScript Malicious Codes Analysis Based on Naive Bayes Classification., , , , and . 3PGCIC, page 513-519. IEEE Computer Society, (2014)