Author of the publication

Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems.

, , , and . IEEE Trans. Inf. Forensics Secur., 14 (5): 1337-1350 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DetectS ec: Evaluating the robustness of object detection models to adversarial attacks., , , , , , , , , and . Int. J. Intell. Syst., 37 (9): 6463-6492 (2022)This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems., , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (5): 3218-3230 (2022)De-SAG: On the De-Anonymization of Structure-Attribute Graph Data., , , , , and . IEEE Trans. Dependable Secur. Comput., 16 (4): 594-607 (2019)MINER: A Hybrid Data-Driven Approach for REST API Fuzzing., , , , , , , , and . CoRR, (2023)Temporal Execution Behavior for Host Anomaly Detection in Programmable Logic Controllers., and . IEEE Trans. Inf. Forensics Secur., (2020)UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers., , , , , , , , , and 2 other author(s). CoRR, (2020)UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware., , , , , , , and . USENIX Security Symposium, page 3421-3438. USENIX Association, (2023)Physical Logic Bombs in 3D Printers via Emerging 4D Techniques., , , , , , , and . ACSAC, page 732-747. ACM, (2021)De-Health: All Your Online Health Information Are Belong to Us., , , , , , , , and . ICDE, page 1609-1620. IEEE, (2020)FDI: Quantifying Feature-based Data Inferability., , , , , , and . CoRR, (2019)