Login / Signup

Exploit dynamic data flows to protect software against semantic attacks.

Kaiyuan KuangZhanyong TangXiaoqing GongDingyi FangXiaojiang ChenHeng ZhangJie LiuZheng Wang
Published in: SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI (2017)
Keyphrases