Author of the publication

iQuery: A Trustworthy and Scalable Blockchain Analytics Platform.

, , , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (6): 4578-4592 (November 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial Attacks on Skeleton-Based Sign Language Recognition., , , , and . ICIRA (1), volume 14267 of Lecture Notes in Computer Science, page 33-43. Springer, (2023)A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices., , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1826-1840 (2022)Multi-level Alignment Network for Domain Adaptive Cross-modal Retrieval., , , , , and . Neurocomputing, (2021)iQuery: A Trustworthy and Scalable Blockchain Analytics Platform., , , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (6): 4578-4592 (November 2023)A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware., , , , , , , , , and 1 other author(s). ISSTA, page 442-454. ACM, (2022)MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols., , , , , , , , , and 1 other author(s). CoRR, (2022)MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 4205-4222. USENIX Association, (2021)One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware., , , , , , , , , and 1 other author(s). IEEE Trans. Dependable Secur. Comput., 21 (3): 1372-1389 (May 2024)