Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis., , , , , and . IEEE Trans. Inf. Forensics Secur., 13 (7): 1838-1853 (2018)Practical Speech Re-use Prevention in Voice-driven Services., , , , and . RAID, page 282-295. ACM, (2021)NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering., , , , , , and . ICNP, page 1-12. IEEE, (2019)BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition., , , , and . WISEC, page 119-124. ACM, (2022)VulHunter: Toward Discovering Vulnerabilities in Android Applications., , , and . IEEE Micro, 35 (1): 44-53 (2015)Programmable Security in the Age of Software-Defined Infrastructure.. CCSW, page 1. ACM, (2021)The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links., , , , , , and . USENIX Security Symposium, page 19-36. USENIX Association, (2019)Enabling Performant, Flexible and Cost-Efficient DDoS Defense With Programmable Switches., , , , , , , , , and . IEEE/ACM Trans. Netw., 29 (4): 1509-1526 (2021)ExAD: An Ensemble Approach for Explanation-based Adversarial Detection., , , , , , and . CoRR, (2021)Do Users Really Know Alexa? Understanding Alexa Skill Security Indicators., , , and . AsiaCCS, page 870-883. ACM, (2023)