Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tracing DDoS attacks using VPNs and mobile agents., , and . PDCS, page 68-73. ISCA, (2007)SKEE: A lightweight Secure Kernel-level Execution Environment for ARM., , , , , , and . NDSS, The Internet Society, (2016)DACSA: A Decoupled Architecture for Cloud Security Analysis., , , , and . CSET, USENIX Association, (2014)SEER: practical memory virus scanning as a service., , , , and . ACSAC, page 186-195. ACM, (2014)Robust Common Spatial Patterns Estimation Using Dynamic Time Warping to Improve BCI Systems., , , and . ICASSP, page 3897-3901. IEEE, (2019)EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning., , , , , , , and . USENIX Security Symposium, page 351-366. USENIX Association, (2015)HIMA: A Hypervisor-Based Integrity Measurement Agent., , , and . ACSAC, page 461-470. IEEE Computer Society, (2009)NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64., , , , , , , and . IEEE Symposium on Security and Privacy, page 304-319. IEEE Computer Society, (2017)Learning Binary Representation for Automatic Patch Detection., , , , , , , , , and . CCNC, page 1-6. IEEE, (2019)Automatic Permission Check Analysis for Linux Kernel., , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (3): 1849-1866 (May 2023)