Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stolen Risks of Models with Security Properties., , , , , and . CCS, page 756-770. ACM, (2023)Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 3201-3217. USENIX Association, (2021)Measuring the Practical Effect of DNS Root Server Instances: A China-Wide Case Study., , , , and . PAM, volume 13210 of Lecture Notes in Computer Science, page 247-263. Springer, (2022)Detecting and Measuring Security Risks of Hosting-Based Dangling Domains., , , , , , , , and . SIGMETRICS (Abstracts), page 87-88. ACM, (2023)A Security Study about Electron Applications and a Programming Methodology to Tame DOM Functionalities., , , , , and . NDSS, The Internet Society, (2023)Lies in the Air: Characterizing Fake-base-station Spam Ecosystem in China., , , , , , , , , and . CCS, page 521-534. ACM, (2020)Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO., , , , , , and . ESORICS (1), volume 12972 of Lecture Notes in Computer Science, page 263-284. Springer, (2021)Continuous Intrusion: Characterizing the Security of Continuous Integration Services., , , , , and . SP, page 1561-1577. IEEE, (2023)Exploit the Last Straw That Breaks Android Systems., , , , , , , and . SP, page 2230-2247. IEEE, (2022)TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (6): 5278-5292 (November 2023)