Personensuche
X
?
2021 2nd International Conference on Big Data & Artificial Intelligence & Software Engineering (ICBASE) ,
1
The Design and Application of Software Measurement and Eval..:
, In:
?
2022 International Conference on Inventive Computation Technologies (ICICT) ,
2
Research on Positioning Accuracy of Welding Robot Based on ..:
, In:
?
2022 International Conference on Industrial IoT, Big Data and Supply Chain (IIoTBDSC) ,
3
Risk Analysis and Prediction for Prostate Cancer based on D..:
, In:
?
2017 IEEE 3rd Information Technology and Mechatronics Engineering Conference (ITOEC) ,
4
Research and application of an improved method for testing ..:
, In:
?
Proceedings of the ACM Web Conference 2023 ,
5
Dynalogue: A Transformer-Based Dialogue System with Dynamic..:
, In:
?
Lecture Notes in Computer Science; Advanced Intelligent Computing Technology and Applications ,
6
Siamese Adaptive Template Update Network for Visual Trackin:
, In:
?
2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
7
A Comparative Study on the Security of Cryptocurrency Walle..:
, In:
?
Network and System Security; Lecture Notes in Computer Science ,
8
Supporting Cyber-Attacks and System Anomaly Detection Resea..:
, In:
?
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering ,
9
Cross-language Android permission specification:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
10
Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snip..:
, In:
?
Algorithms and Architectures for Parallel Processing; Lecture Notes in Computer Science ,
11
RBAC-GL: A Role-Based Access Control Gasless Architecture o..:
, In:
?
Proceedings of the Australasian Computer Science Week Multiconference ,
12
PPM: A Provenance-Provided Data Sharing Model for Open Bank..:
, In:
?
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
13
BHDA - A Blockchain-Based Hierarchical Data Access Model fo..:
, In:
?
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security ,
14
What risk? I don't understand. An Empirical Study on Users'..:
, In:
?
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure ,
15