Author of the publication

Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks.

, , , , , and . CoRR, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RF energy harvester with peak power conversion efficiency tracking., , and . APCCAS, page 107-110. IEEE, (2016)How do online consumers review negatively?, and . CoRR, (2020)Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic., , , , , and . AsiaCCS, page 47-59. ACM, (2020)Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion., , , , , , , , and . IEEE Symposium on Security and Privacy, page 952-966. IEEE, (2019)Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users., , , , , , , , and . DSN, page 222-233. IEEE, (2019)Security Analysis of Device Binding for IP-based IoT Devices., , and . PerCom Workshops, page 900-905. IEEE, (2019)LiCA: A Fine-grained and Path-sensitive Linux Capability Analysis Framework., , , , and . RAID, page 364-379. ACM, (2022)Understanding the Brains and Brawn of Illicit Streaming App., , , , , , and . ICDF2C, volume 441 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 194-214. Springer, (2021)IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing., , , , , , , , , and . NDSS, The Internet Society, (2018)A fully integrable RF energy harvester with dynamic efficiency tuning., , and . ISOCC, page 61-62. IEEE, (2017)