Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security., , , , and . AsiaCCS, page 8-9. ACM, (2012)WebShield: Enabling Various Web Defense Techniques without Client Side Modifications., , , , , , and . NDSS, The Internet Society, (2011)Measurement and Diagnosis of Address Misconfigured P2P Traffic., , , and . INFOCOM, page 1091-1099. IEEE, (2010)Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification., , , , , , , , and . SDM, page 693-701. SIAM, (2019)High Fidelity Data Reduction for Big Data Security Dependency Analyses., , , , , , , , and . CCS, page 504-516. ACM, (2016)Discover and Tame Long-running Idling Processes in Enterprise Systems., , , , , , , and . AsiaCCS, page 543-554. ACM, (2015)Heterogeneous Graph Matching Networks for Unknown Malware Detection., , , , , , , , , and . IJCAI, page 3762-3770. ijcai.org, (2019)Seismic Qualification of Telecommunication System in Nuclear Power Plant., and . ICGEC, volume 329 of Advances in Intelligent Systems and Computing, page 353-358. Springer, (2014)Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality., , , and . ACM Conference on Computer and Communications Security, page 654-656. ACM, (2010)Enhancing Revisitation in Touchscreen Reading for Visually Impaired People with Semantic Navigation Design., , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 6 (3): 126:1-126:22 (2022)