Weiqin Ma

According to our database1, Weiqin Ma authored at least 3 papers between 2010 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Shadow attacks: automatically evading system-call-behavior based malware detection.
J. Comput. Virol., 2012

2010
Privacy-Preserving Matching Protocols for Attributes and Strings.
IACR Cryptol. ePrint Arch., 2010

Rapid prototyping and compact testing of CPU emulators.
Proceedings of the 21st IEEE International Symposium on Rapid System Prototyping, 2010


  Loading...