Search for persons
X
?
Proceedings of the 2023 International Conference on Communication Network and Machine Learning ,
2
NFA Regular Expression Matching based Electriuec Power Sens..:
, In:
?
2022 9th International Forum on Electrical Engineering and Automation (IFEEA) ,
3
Construction of knowledge graph for security threat tracing..:
, In:
?
Advances in Artificial Intelligence and Security; Communications in Computer and Information Science ,
4
A Method of Firmware Vulnerability Mining and Verification ..:
, In:
?
Lecture Notes in Computer Science; Artificial Intelligence and Security ,
5
A Binary Code Vulnerability Mining Method Based on Generati..:
, In:
?
2021 IEEE Sustainable Power and Energy Conference (iSPEC) ,
8
Research on the Security Defense Architecture of the Closed..:
, In:
?
Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System ,
9
Security Vulnerability Assessment of Power IoT based on Bus..:
, In:
?
Advances in Intelligent Systems and Computing; The 10th International Conference on Computer Engineering and Networks ,
10
Trusted Identity Cross-Domain Dynamic Authorization Mechani..:
, In:
?
Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System ,
12
Dynamic Access Control and Authorization System based on Ze..:
, In:
?
Advances in Intelligent Systems and Computing; The 10th International Conference on Computer Engineering and Networks ,
13