Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inferring Hidden IoT Devices and User Interactions via Spatial-Temporal Traffic Fingerprinting., , , , , , and . IEEE/ACM Trans. Netw., 30 (1): 394-408 (2022)PackerGrind: An Adaptive Unpacking System for Android Apps., , , , , , and . IEEE Trans. Software Eng., 48 (2): 551-570 (2022)Vehicle Traffic Driven Camera Placement for Better Metropolis Security Surveillance., , , , , , and . CoRR, (2017)Pinpointing Hidden IoT Devices via Spatial-temporal Traffic Fingerprinting., , , , , and . INFOCOM, page 894-903. IEEE, (2020)Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service., , , , , and . ACSAC, page 119-128. ACM, (2012)Taming energy cost of disk encryption software on data-intensive mobile devices., , , , , and . Future Gener. Comput. Syst., (2020)Querent-centric Domain Name System Modeling and Its Application in Passive Software Discovery., , and . DSA, page 152-160. IEEE, (2021)Taming Energy Cost of Disk Encryption Software on Data-Intensive Mobile Devices., , , , , and . FNC/MobiSPC, volume 94 of Procedia Computer Science, page 83-90. Elsevier, (2016)On Smartly Scanning of the Internet of Things., , , , , , , , , and . IEEE/ACM Trans. Netw., 32 (2): 1019-1034 (April 2024)Towards active measurement for DNS query behavior of botnets., , , and . GLOBECOM, page 845-849. IEEE, (2012)