Author of the publication

Verifying Internet of Things Safety and Security in Physical Spaces.

, , , , and . IEEE Secur. Priv., 17 (5): 30-37 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sensitive Information Tracking in Commodity IoT., , , , , , and . USENIX Security Symposium, page 1687-1704. USENIX Association, (2018)Exposing New Vulnerabilities of Error Handling Mechanism in CAN., , , , and . USENIX Security Symposium, page 4241-4258. USENIX Association, (2021)ATLAS: A Sequence-based Learning Approach for Attack Investigation., , , , , , , and . USENIX Security Symposium, page 3005-3022. USENIX Association, (2021)SARA: Secure Android Remote Authorization., , , , and . USENIX Security Symposium, page 1561-1578. USENIX Association, (2022)Evasion Attacks and Defenses on Smart Home Physical Event Verification., , , and . NDSS, The Internet Society, (2023)Evading Voltage-Based Intrusion Detection on Automotive CAN., , , , , and . NDSS, The Internet Society, (2021)On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities., , , , and . CNS, page 1-6. IEEE, (2020)What Do You See? Evaluation of Explainable Artificial Intelligence (XAI) Interpretability through Neural Backdoors., , and . CoRR, (2020)Detection under Privileged Information., , , , , , and . AsiaCCS, page 199-206. ACM, (2018)Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions., , and . ACSAC, page 366-378. ACM, (2023)