From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating., , , , и . IEEE Symposium on Security and Privacy, стр. 393-408. IEEE Computer Society, (2014)Modeling of Self-Repairing Aircraft Based on Multi-agent System., и . ICNC (5), стр. 241-245. IEEE Computer Society, (2009)Catching predators at watering holes: finding and understanding strategically compromised websites., , , , , , и . ACSAC, стр. 153-166. ACM, (2016)Efficient Ciphertext-Policy Attribute Based Encryption with Hidden Policy., , , , и . IDCS, том 7646 из Lecture Notes in Computer Science, стр. 146-159. Springer, (2012)Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service., , , , , , и . CCS, стр. 1541-1552. ACM, (2016)Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search., , , , , , , , , и 2 other автор(ы). IEEE Symposium on Security and Privacy, стр. 707-723. IEEE Computer Society, (2016)A Highly Efficient Correlation Power Analysis on PRINT Cipher., , , и . CIS, стр. 442-446. IEEE Computer Society, (2012)Cloud repository as a malicious service: challenge, identification and implication., , , , , , и . Cybersecur., 1 (1): 14 (2018)Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion., , , , , , , , и . IEEE Symposium on Security and Privacy, стр. 952-966. IEEE, (2019)Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces., , , и . USENIX Security Symposium, стр. 1027-1041. USENIX Association, (2018)