Search

Your search keyword '"Yunhui Zheng"' showing total 17 results

Search Constraints

Start Over You searched for: Author "Yunhui Zheng" Remove constraint Author: "Yunhui Zheng" Database Complementary Index Remove constraint Database: Complementary Index
17 results on '"Yunhui Zheng"'

Search Results

1. Incorporating Signal Awareness in Source Code Modeling: An Application to Vulnerability Detection.

2. Finding Client-side Business Flow Tampering Vulnerabilities.

3. AdJust: Runtime Mitigation of Resource Abusing Third-Party Online Ads.

4. THE LESSON LEARNT DURING INTERACT - I AND INTERACT - II ACTRIS MEASUREMENT CAMPAIGNS.

5. IntEQ: Recognizing Benign Integer Overflows via Equivalence Checking Across Multiple Precisions.

6. Intercomparison of aerosol measurements performed with multi-wavelength Raman lidars, automatic lidars and ceilometers in the frame of INTERACT-II campaign.

8. Path Sensitive Static Analysis of Web Applications for Remote Code Execution Vulnerability Detection.

9. Static Detection of Resource Contention Problems in Server-Side Scripts.

15. Nonadaptive Group testing based fiber sensor deployment for multiperson tracking.

Catalog

Books, media, physical & digital resources