Author of the publication

Towards the Detection of Inconsistencies in Public Security Vulnerability Reports.

, , , , , and . USENIX Security Symposium, page 869-885. USENIX Association, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient quantum dialogue using entangled states and entanglement swapping without information leakage., , , and . Quantum Inf. Process., 15 (6): 2593-2603 (2016)Influence of early skin-to-skin contact on mother-infant relationship -a qualitative study based on Nvivo12 software analysis., and . ICMHI, page 326-331. ACM, (2023)Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems., , , , , and . NDSS, The Internet Society, (2022)Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms., , , , , , , and . USENIX Security Symposium, page 1133-1150. USENIX Association, (2019)Automatic Firmware Emulation through Invalidity-guided Knowledge Inference., , , and . USENIX Security Symposium, page 2007-2024. USENIX Association, (2021)Vulnerability Dataset Construction Methods Applied To Vulnerability Detection: A Survey., , , , , , , and . DSN Workshops, page 141-146. IEEE, (2022)The Analysis of Peer-to-Peer Network Security., and . GCA, page 131-150. CSREA Press, (2005)Robust Video Object Segmentation via Propagating Seams and Matching Superpixels., , , , and . IEEE Access, (2020)Lullaland: A Multisensory Virtual Reality Experience to Reduce Stress., , , , and . CHI Extended Abstracts, page 198:1-198:6. ACM, (2023)A Soft Decision Scheme against Intermittent SSDF Attack in Cooperative Spectrum Sensing., , and . CIT, page 293-298. IEEE Computer Society, (2014)