Author of the publication

Game of Hide-and-Seek: Exposing Hidden Interfaces in Embedded Web Applications of IoT Devices.

, , , , , , , and . WWW, page 524-532. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Cost-Efficient Router Architecture for HPC Inter-Connection Networks: Design and Implementation., , , and . IEEE Trans. Parallel Distributed Syst., 30 (4): 738-753 (2019)Robust $H_ınfty$ Output Feedback Control of a Rotary Capacitive Power Transfer System., , , and . IEEE Access, (2019)Constructing a database for the relations between CNV and human genetic diseases via systematic text mining., , , , , , , and . BMC Bioinform., 19-S (19): 125-134 (2018)ovAFLow: Detecting Memory Corruption Bugs with Fuzzing-Based Taint Inference., , , , , and . J. Comput. Sci. Technol., 37 (2): 405-422 (2022)Optimization Model of Regional Green Wave Coordination Control for the Coordinated Path Set., , , , and . IEEE Trans. Intell. Transp. Syst., 24 (7): 7000-7011 (2023)AVPredictor: Comprehensive prediction and detection of atomicity violations., , , and . Concurr. Comput. Pract. Exp., (2019)Algebraic method of regional green wave coordinated control., , , , and . J. Intell. Transp. Syst., 27 (6): 799-817 (November 2023)TianheGraph: Customizing Graph Search for Graph500 on Tianhe Supercomputer., , , , , , , and . IEEE Trans. Parallel Distributed Syst., 33 (4): 941-951 (2022)MapEff: An Effective Graph Isomorphism Agorithm Based on the Discrete-Time Quantum Walk., , , , , and . Entropy, 21 (6): 569 (2019)The Vulnerabilities of Graph Convolutional Networks: Stronger Attacks and Defensive Techniques., , , , , and . CoRR, (2019)