From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Characterizing Cryptocurrency-themed Malicious Browser Extensions., , , , , , , и . Proc. ACM Meas. Anal. Comput. Syst., 6 (3): 43:1-43:31 (2021)Scrutinizing Implementations of Smart Home Integrations., , , , , , и . IEEE Trans. Software Eng., 47 (12): 2667-2683 (2021)Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective., , , , , , и . CoRR, (2022)Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols., , , и . SecureComm, том 238 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 469-488. Springer, (2017)MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack., , , , , и . CoRR, (2024)Identifying privacy weaknesses from multi-party trigger-action integration platforms., , , , , , , и . ISSTA, стр. 2-15. ACM, (2021)Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs., , , , , , и . ASE, стр. 1403-1415. IEEE, (2023)Towards Better Generalization for Neural Network-Based SAT Solvers., , , , , , и . PAKDD (2), том 13281 из Lecture Notes in Computer Science, стр. 199-210. Springer, (2022)Better Together: Attaining the Triad of Byzantine-robust Federated Learning via Local Update Amplification., , , и . ACSAC, стр. 201-213. ACM, (2022)A Light-Weight Software Environment for Confining Android Malware., , , , и . SERE (Companion), стр. 158-167. IEEE, (2014)