Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding Evasion Techniques that Abuse Differences Among JavaScript Implementations., , , , and . WISE (2), volume 10570 of Lecture Notes in Computer Science, page 278-294. Springer, (2017)Investigations of Top-Level Domain Name Collisions in Blockchain Naming Services., , , and . WWW, page 2926-2935. ACM, (2024)Fake News Detection via Biased User Profiles in Social Networking Sites., , , , , , and . WI/IAT, page 136-145. ACM, (2021)POSTER: Predicting Website Abuse Using Update Histories., , , , and . WWW (Companion Volume), page 9-10. ACM, (2018)Impact Analysis of Organizational Structure of Group Companies on Privacy Policies., , , , and . WPES@CCS, page 159-165. ACM, (2023)Malicious URL sequence detection using event de-noising convolutional neural network., , , , , , , and . ICC, page 1-7. IEEE, (2017)Understanding the origins of mobile app vulnerabilities: a large-scale measurement study of free and paid apps., , , , , , , , , and . MSR, page 14-24. IEEE Computer Society, (2017)MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks., , , , and . COMPSAC, page 444-449. IEEE Computer Society, (2015)Account Discovery: Identifying Web3 SNS Accounts at Risk of De-anonymization., , , , , and . SAC, page 259-268. ACM, (2024)Understanding the security management of global third-party Android marketplaces., , , , , , , , and . WAMA@ESEC/SIGSOFT FSE, page 12-18. ACM, (2017)