Author of the publication

Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems.

, , , , and . IEEE Trans. Dependable Secur. Comput., 18 (2): 825-842 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Destination-Driven On-Demand Multicast Routing Protocol for Wireless Ad Hoc Networks., , , , and . ICC, page 1-5. IEEE, (2009)Detection of Repackaged Android Malware with Code-Heterogeneity Features., , , , and . IEEE Trans. Dependable Secur. Comput., 17 (1): 64-77 (2020)Living-Off-The-Land Command Detection Using Active Learning., , , , , , , , and . RAID, page 442-455. ACM, (2021)Probabilistic Program Modeling for High-Precision Anomaly Classification., , , and . CSF, page 497-511. IEEE Computer Society, (2015)Development of a Multi-viewpoint AR-Based Mobile Learning System for Supporting Lunar Observation., , , , and . SITIS, page 1034-1041. IEEE Computer Society, (2013)Research on Unified Authorized Management Platform in E-government., , and . ChinaGrid, page 214-217. IEEE Computer Society, (2010)Prioritizing data flows and sinks for app security transformation., , , and . Comput. Secur., (2020)Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems., , , , and . CoRR, (2018)M-VSARL system in secondary school science education: Lunar phase class case study., , , , and . GCCE, page 321-322. IEEE, (2014)aiai at the FinSBD-3 task: Structure Boundary Detection of Noisy Financial Texts in English and French Using Data Augmentation and Hybrid Deep Learning Model., and . WWW (Companion Volume), page 283-287. ACM / IW3C2, (2021)