Author of the publication

Behind the Scenes: Uncovering TLS and Server Certificate Practice of IoT Device Vendors in the Wild.

, , , , , , , , and . IMC, page 457-477. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Influence of Murder Incident of Ride-hailing Drivers on Ride-hailing User's Consuming Willingness in Nanchang., , , , , and . CoRR, (2020)Securing Internet Applications from Routing Attacks., , , , , , and . CoRR, (2020)Representation of Chinese criminal law in the semantic web., , , and . ICNC-FSKD, page 1676-1680. IEEE, (2016)Securing internet applications from routing attacks., , , , , , and . Commun. ACM, 64 (6): 86-96 (2021)Adaptive replanning and control for magnetic microrobots tracking despite unknown blood velocity., , and . CDC, page 1789-1794. IEEE, (2021)Creating a Secure Underlay for the Internet., , , , , , , , and . USENIX Security Symposium, page 2601-2618. USENIX Association, (2022)Output Feedback Synthesis for a Two-Agent Nonlinear Microrobotic System., , and . CDC, page 6844-6850. IEEE, (2019)Detecting Malware Injection with Program-DNS Behavior., , , , , , , , , and 1 other author(s). EuroS&P, page 552-568. IEEE, (2020)Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks., , , , , and . ACSAC, page 565-579. ACM, (2023)RAPTOR: Routing Attacks on Privacy in Tor., , , , , , and . CoRR, (2015)