Cited By
View all- Xu DTang DChen YWang XChen KTang HLi LBalzarotti DXu W(2024)Racing on the negative forceProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699137(4229-4246)Online publication date: 14-Aug-2024
- Zhao LJiang KZhu YWang LMing J(2023)Capturing Invalid Input Manipulations for Memory Corruption DiagnosisIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.314502220:2(917-930)Online publication date: 1-Mar-2023
- Sagdatullin A(2023)Cybersecurity System with State Observer and K-Means Clustering Machine Learning ModelDistributed Computer and Communication Networks10.1007/978-3-031-30648-8_15(183-195)Online publication date: 1-May-2023
- Show More Cited By