Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling., , , and . DSN, page 411-423. IEEE, (2020)Perception-oriented generative adversarial network for retinal fundus image super-resolution., , , and . Comput. Biol. Medicine, (January 2024)Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks., , , and . SP, page 285-302. IEEE, (2022)No More Companion Apps Hacking but One Dongle: Hub-Based Blackbox Fuzzing of IoT Firmware., , , and . MobiSys, page 205-218. ACM, (2023)e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices., , , , and . CNS, page 1-9. IEEE, (2018)PFirewall: Semantics-Aware Customizable Data Flow Control for Home Automation Systems., , , and . CoRR, (2019)Privacy-preserving use of genomic data on mobile devices., , , and . ICCC, page 1-6. IEEE, (2015)FineRoute: Personalized and Time-Aware Route Recommendation Based on Check-Ins., , , and . IEEE Trans. Vehicular Technology, 66 (11): 10461-10469 (2017)Two-party and multi-party private matching for proximity-based mobile social networks., , , , and . ICC, page 926-931. IEEE, (2014)Sample Efficient Offline-to-Online Reinforcement Learning., , , , , , and . IEEE Trans. Knowl. Data Eng., 36 (3): 1299-1310 (March 2024)