Author of the publication

Detecting Malicious Server Based on Server-to-Server Realation Graph.

, , , , , , and . DSC, page 698-702. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Users Interpret Bugs in Trigger-Action Programming., , , , , , , and . CHI, page 552. ACM, (2019)SoK: Context Sensing for Access Control in the Adversarial Home IoT., , , , , , and . EuroS&P, page 37-53. IEEE, (2021)Can Allowlists Capture the Variability of Home IoT Device Network Behavior?, , , , , , and . EuroS&P, page 114-138. IEEE, (2024)The HandyTech's Coming Between 1 and 4: Privacy Opportunities and Challenges for the IoT Handyperson., , , , , , and . WPES@CCS, page 129-134. ACM, (2023)AutoTap: synthesizing and repairing trigger-action programs using LTL properties., , , , , and . ICSE, page 281-291. IEEE / ACM, (2019)When Smart Devices Are Stupid: Negative Experiences Using Home Smart Devices., , , , and . IEEE Symposium on Security and Privacy Workshops, page 150-155. IEEE, (2019)Detecting Malicious Server Based on Server-to-Server Realation Graph., , , , , , and . DSC, page 698-702. IEEE Computer Society, (2016)Well-intended but half-hearted: Hosts' consideration of guests' privacy using smart devices on rental properties., , , , , , , and . SOUPS @ USENIX Security Symposium, page 179-198. USENIX Association, (2024)Challenges and opportunities in onboarding smart-home devices., , , , and . HotMobile, page 60-65. ACM, (2024)