Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Analysis of Peer-to-Peer Network Security., and . GCA, page 131-150. CSREA Press, (2005)Robust Video Object Segmentation via Propagating Seams and Matching Superpixels., , , , and . IEEE Access, (2020)Vulnerability Dataset Construction Methods Applied To Vulnerability Detection: A Survey., , , , , , , and . DSN Workshops, page 141-146. IEEE, (2022)Lullaland: A Multisensory Virtual Reality Experience to Reduce Stress., , , , and . CHI Extended Abstracts, page 198:1-198:6. ACM, (2023)Automatic Firmware Emulation through Invalidity-guided Knowledge Inference., , , and . USENIX Security Symposium, page 2007-2024. USENIX Association, (2021)Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms., , , , , , , and . USENIX Security Symposium, page 1133-1150. USENIX Association, (2019)Influence of early skin-to-skin contact on mother-infant relationship -a qualitative study based on Nvivo12 software analysis., and . ICMHI, page 326-331. ACM, (2023)Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems., , , , , and . NDSS, The Internet Society, (2022)Batch Adaptative Streaming for Video Analytics., , , , , , and . INFOCOM, page 2158-2167. IEEE, (2022)The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved., , , , and . IEEE Internet Things J., 6 (2): 1606-1616 (2019)