|
|
|
Jiaxian Wang, Yunkai Ji, Changling Liu, Qingguo Meng, Yapeng Zhao, Zhun Zhang, Jianye Sun, Lele Liu and Fulong Ning
|
|
|
|
|
|
|
Ziyan Zhang, Zhiping Dan, Fangmin Dong, Zhun Gao and Yanke Zhang
|
|
|
|
|
|
|
Ziyan Zhang, Zhiping Dan, Fangmin Dong, Zhun Gao and Yanke Zhang
Many rumors spread quickly and widely on social media, affecting social stability. The rumors of most current detection methods only use textual information or introduce external auxiliary information (such as user information and propagation information...
ver más
|
|
|
|
|
|
|
Zhun Zhang, Xiang Wang, Qiang Hao, Dongdong Xu, Jiqing Wang, Jiakang Liu, Jinhui Ma and Jinlei Zhang
Embedded systems are increasingly applied in numerous security-sensitive applications, such as industrial controls, railway transports, intelligent vehicles, avionics and aerospace. However, embedded systems are compromised in the execution of untrusted ...
ver más
|
|
|
|