共 28 条
[1]
[Anonymous], 2016, P NETW DISTR SYST SE
[2]
[Anonymous], 2013, PROC 22 USENIX SECUR, DOI DOI 10.5555/2534766.2534774
[3]
[Anonymous], P NEURAL INFORM PROC
[4]
Bayer U., 2009, NDSS
[6]
Automatic patch-based exploit generation is possible: Techniques and implications
[J].
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2008,
:143-+
[7]
BinGo: Cross-Architecture Cross-OS Binary Search
[J].
FSE'16: PROCEEDINGS OF THE 2016 24TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON FOUNDATIONS OF SOFTWARE ENGINEERING,
2016,
:678-689
[8]
Wireless Elevator Communication and Monitor System Design Based on ZigBee Technology and Ethernet
[J].
PROCEEDINGS OF THE 2019 IEEE EURASIA CONFERENCE ON IOT, COMMUNICATION AND ENGINEERING (ECICE),
2019,
:369-372
[9]
Dai HJ, 2016, PR MACH LEARN RES, V48
[10]
David Y, 2016, ACM SIGPLAN NOTICES, V51, P266, DOI [10.1145/2908080.2908126, 10.1145/2980983.2908126]