From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks., , , и . ACSAC, стр. 466-475. ACM, (2014)Virtual browser: a web-level sandbox to secure third-party JavaScript without sacrificing functionality., , , и . ACM Conference on Computer and Communications Security, стр. 654-656. ACM, (2010)TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications., , , , и . NDSS, The Internet Society, (2020)Practical Blind Membership Inference Attack via Differential Comparisons., , , , , и . NDSS, The Internet Society, (2021)Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches., , , , , , , , и . USENIX Security Symposium, стр. 1993-2010. USENIX Association, (2022)An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem., , , , , и . USENIX Security Symposium, стр. 2793-2810. USENIX Association, (2020)Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps: A System Perspective., , , , , , и . SP, стр. 934-950. IEEE, (2023)Addressing Heterogeneity in Federated Learning via Distributional Transformation., , , , , и . ECCV (38), том 13698 из Lecture Notes in Computer Science, стр. 179-195. Springer, (2022)Showcasing the Threat of Scalable Generative AI Disinformation through Social Media Simulation., , , , и . INFOCOM (Workshops), стр. 1-2. IEEE, (2024)SafePay: Protecting against credit card forgery with existing magnetic card readers., , и . CNS, стр. 164-172. IEEE, (2015)