Author of the publication

S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services.

, , and . DSN, page 287-298. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos., , , , , , and . IEEE Secur. Priv., 15 (2): 42-49 (2017)Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels at Scale., , , , , , and . CoRR, (2022)OS-Aware Vulnerability Prioritization via Differential Severity Analysis., , , and . USENIX Security Symposium, page 395-412. USENIX Association, (2022)Understanding iOS-based Crowdturfing Through Hidden UI Analysis., , , , , , and . USENIX Security Symposium, page 765-781. USENIX Association, (2019)Learning Security Classifiers with Verified Global Robustness Properties., , , , , and . CCS, page 477-494. ACM, (2021)Characterizing Long-tail SEO Spam on Cloud Web Hosting Services., , , , , and . WWW, page 321-332. ACM, (2016)Analyzing Ground-Truth Data of Mobile Gambling Scams., , , , , , and . SP, page 2176-2193. IEEE, (2022)Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks., , , , , and . NDSS, The Internet Society, (2021)Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service., , , , , , and . CCS, page 1541-1552. ACM, (2016)RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection., , , , , , , and . CCS, page 1837-1852. ACM, (2020)