A Method for Resume Information Extraction Using BERT-BiLSTM-CRF. | 0 | 0.34 | 2021 |
FIRMCORN: Vulnerability-Oriented Fuzzing of IoT Firmware via Optimized Virtual Execution | 1 | 0.41 | 2020 |
Bin: A Two-Level Learning-Based Bug Search For Cross-Architecture Binary | 0 | 0.34 | 2019 |
Semantic-based Malware Behavior Description - Past and Future. | 0 | 0.34 | 2019 |
Cryptographic Algorithms Analysis Technology Research Based on Functions Signature Recognition | 0 | 0.34 | 2014 |
A Process Model for Forensic Analysis of Symbian Smart Phones | 3 | 0.41 | 2009 |
Ewap: Using Symbolic Execution to Exploit Windows Applications | 1 | 0.35 | 2009 |
Wetrp: A Platform for Recording of Windows Program Execution Traces | 0 | 0.34 | 2008 |