From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion., , , , , , , , и . IEEE Symposium on Security and Privacy, стр. 952-966. IEEE, (2019)Stolen Risks of Models with Security Properties., , , , , и . CCS, стр. 756-770. ACM, (2023)Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications., , , , , , и . USENIX Security Symposium, стр. 1307-1324. USENIX Association, (2021)S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services., , и . DSN, стр. 287-298. IEEE Computer Society, (2014)Cloud repository as a malicious service: challenge, identification and implication., , , , , , и . Cybersecur., 1 (1): 14 (2018)OS-Aware Vulnerability Prioritization via Differential Severity Analysis., , , и . USENIX Security Symposium, стр. 395-412. USENIX Association, (2022)Understanding iOS-based Crowdturfing Through Hidden UI Analysis., , , , , , и . USENIX Security Symposium, стр. 765-781. USENIX Association, (2019)Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks., , , , , и . NDSS, The Internet Society, (2021)Learning Security Classifiers with Verified Global Robustness Properties., , , , , и . CCS, стр. 477-494. ACM, (2021)Analyzing Ground-Truth Data of Mobile Gambling Scams., , , , , , и . SP, стр. 2176-2193. IEEE, (2022)