From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Real-time Analysis of Privacy-(un)aware IoT Applications., , , и . Proc. Priv. Enhancing Technol., 2021 (1): 145-166 (2021)IoTRepair: Flexible Fault Handling in Diverse IoT Deployments., , , , , , и . ACM Trans. Internet Things, 3 (3): 22:1-22:33 (2022)Salting Public Traces with Attack Traffic to Test Flow Classifiers., , , и . CSET, USENIX Association, (2011)ZBCAN: A Zero-Byte CAN Defense System., , , , , , и . USENIX Security Symposium, стр. 6893-6910. USENIX Association, (2023)Understanding the Security and Privacy Implications of Online Toxic Content on Refugees., , , и . USENIX Security Symposium, USENIX Association, (2024)A Systematic Study of Physical Sensor Attack Hardness., , , , , , и . SP, стр. 2328-2347. IEEE, (2024)The Limitations of Deep Learning in Adversarial Settings., , , , , и . CoRR, (2015)What Do You See?: Evaluation of Explainable Artificial Intelligence (XAI) Interpretability through Neural Backdoors., , и . KDD, стр. 1027-1035. ACM, (2021)On the Safety Implications of Misordered Events and Commands in IoT Systems., , , , и . SP (Workshops), стр. 235-241. IEEE, (2021)Malware traffic detection using tamper resistant features., , , и . MILCOM, стр. 330-335. IEEE, (2015)