From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications., , , , и . Inscrypt, том 11449 из Lecture Notes in Computer Science, стр. 349-369. Springer, (2018)Demystifying Illegal Mobile Gambling Apps., , , , , и . WWW, стр. 1447-1458. ACM / IW3C2, (2021)As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service., , , , , и . NDSS, The Internet Society, (2021)Tracking Counterfeit Cryptocurrency End-to-end., , , , , , и . SIGMETRICS (Abstracts), стр. 33-34. ACM, (2021)On a New Class of Pulsing Denial-of-Service Attacks and the Defense., и . NDSS, The Internet Society, (2005)HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows., , , , , и . NDSS, The Internet Society, (2011)Demystifying the underground ecosystem of account registration bots., , , , , и . ESEC/SIGSOFT FSE, стр. 897-909. ACM, (2022)A Blockchain-Based IoT Data Management System for Secure and Scalable Data Sharing., , , , и . NSS, том 11928 из Lecture Notes in Computer Science, стр. 167-184. Springer, (2019)PrIntFuzz: fuzzing Linux drivers via automated virtual device simulation., , , , , , и . ISSTA, стр. 404-416. ACM, (2022)APER: Evolution-Aware Runtime Permission Misuse Detection for Android Apps., , , , , , и . ICSE, стр. 125-137. ACM, (2022)