The following publications are possibly variants of this publication:
- Vulnerability mining for network protocols based on fuzzingSai-Dan Zhang, Lu-Yong Zhang. icsai 2014: 644-648 [doi]
- Medical Protocol Security: DICOM Vulnerability Mining Based on Fuzzing TechnologyZhiqiang Wang, Quanqi Li, Yazhe Wang, Biao Liu, Jianyi Zhang, Qixu Liu. ccs 2019: 2549-2551 [doi]
- DiPri: Distance-Based Seed Prioritization for Greybox Fuzzing (Registered Report)Ruixiang Qian, Quanjun Zhang, Chunrong Fang, Zhenyu Chen. fuzzing 2023: 21-30 [doi]
- DICOM-Fuzzer: Research on DICOM Vulnerability Mining Based on Fuzzing TechnologyZhiqiang Wang, Quanqi Li, Qian Liu, Biao Liu, Jianyi Zhang, Tao Yang, Qixu Liu. chinacom 2020: 509-524 [doi]
- A region-based routing protocol for wireless mobile ad hoc networksYong Liu, Xuhui Hu, Myung J. Lee, Tarek N. Saadawi. network, 18(4):12-17, 2004. [doi]