CHEN Qian
Beijing Key Laboratory of IOT Information Security Technology(Institute of Information Engineering, Chinese Academy of Sciences), Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Science, Beijing 100049, China;Qihoo 360 Technology Co. Ltd., Beijing 100015, ChinaCHENG Kai
Beijing Key Laboratory of IOT Information Security Technology(Institute of Information Engineering, Chinese Academy of Sciences), Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Science, Beijing 100049, ChinaZHENG Yao-Wen
Beijing Key Laboratory of IOT Information Security Technology(Institute of Information Engineering, Chinese Academy of Sciences), Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Science, Beijing 100049, ChinaZHU Hong-Song
Beijing Key Laboratory of IOT Information Security Technology(Institute of Information Engineering, Chinese Academy of Sciences), Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Science, Beijing 100049, ChinaSUN Li-Min
Beijing Key Laboratory of IOT Information Security Technology(Institute of Information Engineering, Chinese Academy of Sciences), Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Science, Beijing 100049, ChinaNational Natural Science Foundation of China (U1766215, U1636120); International Cooperation Project of Institute of Information Engineering, Chinese Academy of Sciences (Y7Z0451104); Science and Technology Project of State Grid Corporation of China (52110417001B)
陈千,程凯,郑尧文,朱红松,孙利民.函数级数据依赖图及其在静态脆弱性分析中的应用.软件学报,2020,31(11):3421-3435
Copy