Author of the publication

FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution.

, , , , , , , , , and . ASE, page 792-804. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multipodal Structure and Phase Transitions in Large Constrained Graphs., , , and . CoRR, (2014)Enabling Public Verifiability and Data Dynamics for Storage Security., , , , and . IACR Cryptology ePrint Archive, (2009)Blind Recognition of Touched Keys on Mobile Devices., , , , , and . ACM Conference on Computer and Communications Security, page 1403-1414. ACM, (2014)Attribute-based fine-grained access control with efficient revocation in cloud storage systems., , and . AsiaCCS, page 523-528. ACM, (2013)Towards Privacy-Preserving Malware Detection Systems for Android., , , , and . ICPADS, page 545-552. IEEE, (2018)Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations., , , and . IEEE Trans. Parallel Distributed Syst., 24 (6): 1172-1181 (2013)Inverse transport calculations in optical imaging with subspace optimization algorithms., and . J. Comput. Phys., (2014)Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks., , and . IEEE Trans. Wirel. Commun., 7 (1): 354-363 (2008)Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices., , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 6 (2): 77:1-77:26 (2022)A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses., , , , , , , and . IEEE Commun. Surv. Tutorials, 24 (4): 2292-2328 (2022)