Author of the publication

Improving Real-world Password Guessing Attacks via Bi-directional Transformers.

, , , , , , and . USENIX Security Symposium, page 1001-1018. USENIX Association, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking., , , and . SACMAT, page 135-145. ACM, (2015)SPA: Inviting Your Friends to Help Set Android Apps., , , , , and . SACMAT, page 221-231. ACM, (2015)Efficient General Policy Decision by Using Mutable Variable Aware Cache., , , , and . COMPSAC, page 359-368. IEEE Computer Society, (2013)A Bitcoin Transaction Analyzing and Tracking Mechanism in Specified Network Zone., , , , and . J. Inf. Sci. Eng., 40 (2): 375-396 (March 2024)Towards Understanding the fairness of differentially private margin classifiers, , , and . World Wide Web, (2022)Ents: An Efficient Three-party Training Framework for Decision Trees by Communication Optimization., , , , , , and . CoRR, (2024)Value-centric design of the internet-of-things solution for food supply chain: Value creation, sensor portfolio and information fusion., , , and . Inf. Syst. Frontiers, 17 (2): 289-319 (2015)DESC: enabling secure data exchange based on smart contracts., , , , , , and . Sci. China Inf. Sci., 61 (4): 049102:1-049102:3 (2018)Privacy Compliance: Can Technology Come to the Rescue?, , , , , and . IEEE Security & Privacy, 19 (4): 37-43 (2021)SCout: Prying Into Supply Chains via a Public Query Interface., , , and . IEEE Syst. J., 10 (1): 179-188 (2016)