Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Security Classifiers with Verified Global Robustness Properties., , , , , and . CCS, page 477-494. ACM, (2021)OS-Aware Vulnerability Prioritization via Differential Severity Analysis., , , and . USENIX Security Symposium, page 395-412. USENIX Association, (2022)Understanding iOS-based Crowdturfing Through Hidden UI Analysis., , , , , , and . USENIX Security Symposium, page 765-781. USENIX Association, (2019)Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks., , , , , and . NDSS, The Internet Society, (2021)Analyzing Ground-Truth Data of Mobile Gambling Scams., , , , , , and . SP, page 2176-2193. IEEE, (2022)RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection., , , , , , , and . CCS, page 1837-1852. ACM, (2020)Resident Evil: Understanding Residential IP Proxy as a Dark Service., , , , , , , , , and . IEEE Symposium on Security and Privacy, page 1185-1201. IEEE, (2019)Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search., , , , , , , , , and 2 other author(s). IEEE Symposium on Security and Privacy, page 707-723. IEEE Computer Society, (2016)Characterizing Long-tail SEO Spam on Cloud Web Hosting Services., , , , , and . WWW, page 321-332. ACM, (2016)Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service., , , , , , and . CCS, page 1541-1552. ACM, (2016)