Author of the publication

HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs.

, , , , , , and . USENIX Security Symposium, page 4553-4570. USENIX Association, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound., , , and . CoRR, (2014)Understanding Mobile Users' Privacy Expectations: A Recommendation-Based Method Through Crowdsourcing., , , , , , and . IEEE Trans. Serv. Comput., 12 (2): 304-318 (2019)FLAM-PUF: A Response-Feedback-Based Lightweight Anti-Machine-Learning-Attack PUF., , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (11): 4433-4444 (2022)Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound., , , and . CCS, page 429-440. ACM, (2014)No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis., , , and . IEEE Symposium on Security and Privacy, page 414-432. IEEE Computer Society, (2016)Hidden Electricity Theft by Exploiting Multiple-Pricing Scheme in Smart Grids., , , , and . IEEE Trans. Inf. Forensics Secur., (2020)Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be., , , , , , , , , and 4 other author(s). CoRR, (2017)Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection., , , and . CoRR, (2019)Android on PC: On the Security of End-user Android Emulators., , , , , , and . CCS, page 1566-1580. ACM, (2021)Knowing your enemy: understanding and detecting malicious web advertising., , , , and . CCS, page 674-686. ACM, (2012)