Cited By
View all- Chen BZhang LHuang XCao YLian KZhang YYang M(2024)Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Construction2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00150(3961-3978)Online publication date: 19-May-2024
- Olusanya OJimoh RMisra SAwotunde J(2024)A neuro-fuzzy security risk assessment system for software development life cycleHeliyon10.1016/j.heliyon.2024.e3349510:13(e33495)Online publication date: Jul-2024
- Choi KSon DKim YSeo JWilliams BChen YNeville J(2023)Testing the channels of convolutional neural networksProceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence and Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence and Thirteenth Symposium on Educational Advances in Artificial Intelligence10.1609/aaai.v37i12.26726(14774-14782)Online publication date: 7-Feb-2023
- Show More Cited By