Author of the publication

CADE: Detecting and Explaining Concept Drift Samples for Security Applications.

, , , , , , and . USENIX Security Symposium, page 2327-2344. USENIX Association, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A 6.7nV/√Hz Sub-mHz-1/f-corner 14b analog-to-digital interface for rail-to-rail precision voltage sensing., , , and . ISSCC, page 246-248. IEEE, (2011)Agent-Based Routing for Wireless Sensor Network., , and . ICIC (1), volume 4681 of Lecture Notes in Computer Science, page 68-79. Springer, (2007)A highly scalable bandwidth estimation of commercial hotspot access points., , , and . INFOCOM, page 1143-1151. IEEE, (2011)Errors, Misunderstandings, and Attacks: Analyzing the Crowdsourcing Process of Ad-blocking Systems., , , and . Internet Measurement Conference, page 230-244. ACM, (2019)Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation., , , , , , , , , and . IEEE Trans. Mob. Comput., 19 (12): 2946-2964 (2020)PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary., , , , , , , and . AsiaCCS, page 633-645. ACM, (2019)SafeVchat: A System for Obscene Content Detection in Online Video Chat Services., , , , , , , , and . ACM Trans. Internet Techn., 12 (4): 13:1-13:26 (2013)FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware., , , , and . CCS, page 2231-2244. ACM, (2017)RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections., , , , , , , and . CCS, page 3093-3107. ACM, (2023)TrackMeOrNot: Enabling Flexible Control on Web Tracking., , , and . WWW, page 99-109. ACM, (2016)