From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Scrutinizing Implementations of Smart Home Integrations., , , , , , и . IEEE Trans. Software Eng., 47 (12): 2667-2683 (2021)Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols., , , и . SecureComm, том 238 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 469-488. Springer, (2017)Towards Better Generalization for Neural Network-Based SAT Solvers., , , , , , и . PAKDD (2), том 13281 из Lecture Notes in Computer Science, стр. 199-210. Springer, (2022)Identifying privacy weaknesses from multi-party trigger-action integration platforms., , , , , , , и . ISSTA, стр. 2-15. ACM, (2021)Better Together: Attaining the Triad of Byzantine-robust Federated Learning via Local Update Amplification., , , и . ACSAC, стр. 201-213. ACM, (2022)A Light-Weight Software Environment for Confining Android Malware., , , , и . SERE (Companion), стр. 158-167. IEEE, (2014)Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs., , , , , , и . ASE, стр. 1403-1415. IEEE, (2023)Security Checking of Trigger-Action-Programming Smart Home Integrations., , , , , , и . ISSTA, стр. 639-651. ACM, (2023)MoScan: a model-based vulnerability scanner for web single sign-on services., , , , и . ISSTA, стр. 678-681. ACM, (2021)An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems., , , , , и . TrustCom, стр. 827-835. IEEE, (2020)