Author of the publication

Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web.

, , , and . AsiaCCS, page 168-180. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting UAV for Air-Ground Integrated Federated Learning: A Joint UAV Location and Resource Optimization Approach., , , , , , and . IEEE Trans. Green Commun. Netw., 7 (3): 1420-1433 (September 2023)Model Stealing Attacks Against Inductive Graph Neural Networks., , , and . CoRR, (2021)Research on the Application of 5G Cloud-network-edge-device Convergence and Intelligent Video Technology in Smart Grid., , , and . IWCMC, page 1286-1290. IEEE, (2021)ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks., and . USENIX Security Symposium, page 905-921. USENIX Association, (2019)A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned., , and . USENIX Security Symposium, page 1167-1184. USENIX Association, (2022)Joint UAV Location and Resource Allocation for Air-Ground Integrated Federated Learning., , , , , and . GLOBECOM, page 1-6. IEEE, (2021)Water Temperature Observation by Coastal Acoustic Tomography in Artificial Upwelling Area., , , , and . Sensors, 19 (12): 2655 (2019)Inference Attacks Against Graph Neural Networks., , , , and . CoRR, (2021)Comprehensive Assessment of Toxicity in ChatGPT., , , , , , , , and . CoRR, (2023)Rapid Adoption, Hidden Risks: The Dual Impact of Large Language Model Customization., , , , , , , and . CoRR, (2024)