Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Evaluation of Remote Video Surveillance System on Private Cloud., , and . ISBAST, page 256-262. IEEE, (2014)Augmenting matrix factorization technique with the combination of tags and genres, , , , , , , and . Physica A: Statistical Mechanics and its Applications, (2016)PatchNet: Hierarchical Deep Learning-Based Stable Patch Identification for the Linux Kernel, , , , and . IEEE Transactions on Software Engineering, 47 (11): 2471-2486 (November 2021)Cerberus: Query-driven Scalable Vulnerability Detection in OAuth Service Provider Implementations., , and . CCS, page 2459-2473. ACM, (2022)Hardware/Software Security Patches for the Internet of Things., , , and . SMARTCOMP, page 240-245. IEEE, (2021)SMS Goes Nuclear: Fortifying SMS-Based MFA in Online Account Ecosystem., , , , , and . DSN Workshops, page 7-14. IEEE, (2021)UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware., , , , , , , and . USENIX Security Symposium, page 3421-3438. USENIX Association, (2023)Detecting Hybrid Anomalies Using an Unsupervised Approach in Online Social Networks., , and . ICBDS, volume 1563 of Communications in Computer and Information Science, page 630-642. Springer, (2021)Trustworthy Collaborative Trajectory Privacy Scheme for Continuous LBS., , , , and . ICBDS, volume 1563 of Communications in Computer and Information Science, page 149-170. Springer, (2021)Distributed Differential Privacy Protection System for Personalized Recommendation., , , , , , and . ICBDS, volume 1210 of Communications in Computer and Information Science, page 211-222. Springer, (2019)