Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware., , , , , , , and . USENIX Security Symposium, page 3421-3438. USENIX Association, (2023)De-SAG: On the De-Anonymization of Structure-Attribute Graph Data., , , , , and . IEEE Trans. Dependable Secur. Comput., 16 (4): 594-607 (2019)Physical Logic Bombs in 3D Printers via Emerging 4D Techniques., , , , , , , and . ACSAC, page 732-747. ACM, (2021)De-Health: All Your Online Health Information Are Belong to Us., , , , , , , , and . ICDE, page 1609-1620. IEEE, (2020)SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems, , , , , and . (2019)cite arxiv:1901.07846Comment: The experimental results were not up to our expectation.Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks., , , , , , , , , and . CCS, page 516-534. ACM, (2021)MaMIoT: Manipulation of Energy Market Leveraging High Wattage IoT Botnets., , , and . CCS, page 1338-1356. ACM, (2021)A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware., , , , , , , , , and 1 other author(s). ISSTA, page 442-454. ACM, (2022)If I Knew Then What I Know Now: On Reevaluating DNP3 Security using Power Substation Traffic., , , and . ICSS, page 48-59. ACM, (2019)Hiding My Real Self! Protecting Intellectual Property in Additive Manufacturing Systems Against Optical Side-Channel Attacks., , and . NDSS, The Internet Society, (2022)