From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities., , , , и . CoRR, (2018)CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis., , , , , , и . IET Inf. Secur., 17 (4): 582-597 (июля 2023)Verifying Internet of Things Safety and Security in Physical Spaces., , , , и . IEEE Secur. Priv., 17 (5): 30-37 (2019)PPMCK: Privacy-preserving multi-party computing for K-means clustering., , , , , , , и . J. Parallel Distributed Comput., (2021)Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities., , , , и . ACM Comput. Surv., 52 (4): 74:1-74:30 (2019)Privacy preserving based logistic regression on big data., , , , , , и . J. Netw. Comput. Appl., (2020)Markup SVG - An Online Content-Aware Image Abstraction and Annotation Tool., , и . IEEE Trans. Multim., 13 (5): 993-1006 (2011)Prioritizing data flows and sinks for app security transformation., , , и . Comput. Secur., (2020)Ghost Thread: Effective User-Space Cache Side Channel Protection., , , и . CODASPY, стр. 233-244. ACM, (2021)Privacy-Preserving Protocols for Smart Cameras and Other IoT Devices., , , , , , , и . CoRR, (2022)