Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

De-SAG: On the De-Anonymization of Structure-Attribute Graph Data., , , , , and . IEEE Trans. Dependable Secur. Comput., 16 (4): 594-607 (2019)UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware., , , , , , , and . USENIX Security Symposium, page 3421-3438. USENIX Association, (2023)Physical Logic Bombs in 3D Printers via Emerging 4D Techniques., , , , , , , and . ACSAC, page 732-747. ACM, (2021)De-Health: All Your Online Health Information Are Belong to Us., , , , , , , , and . ICDE, page 1609-1620. IEEE, (2020)SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems, , , , , and . (2019)cite arxiv:1901.07846Comment: The experimental results were not up to our expectation.MaMIoT: Manipulation of Energy Market Leveraging High Wattage IoT Botnets., , , and . CCS, page 1338-1356. ACM, (2021)Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks., , , , , , , , , and . CCS, page 516-534. ACM, (2021)Hiding My Real Self! Protecting Intellectual Property in Additive Manufacturing Systems Against Optical Side-Channel Attacks., , and . NDSS, The Internet Society, (2022)IFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware., , , , , , , , , and . ASE, page 805-816. IEEE, (2021)If I Knew Then What I Know Now: On Reevaluating DNP3 Security using Power Substation Traffic., , , and . ICSS, page 48-59. ACM, (2019)