Cited By
View all- Zhao XQu HYi JWang JTian MZhao F(2024)A Fuzzer for Detecting Use-After-Free VulnerabilitiesMathematics10.3390/math1221343112:21(3431)Online publication date: 1-Nov-2024
- Du CXu GGuo YWang ZYu W(2024)A Novel Seed Generation Approach for Vulnerability Mining Based on Generative Adversarial Networks and Attention MechanismsMathematics10.3390/math1205074512:5(745)Online publication date: 1-Mar-2024
- Guo JZhao DGu CChen XZhang XJu M(2024)An enhanced state-aware model learning approach for security analysis in lightweight protocol implementationsJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-024-00593-013:1Online publication date: 30-Jan-2024
- Show More Cited By