From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound., , , и . CoRR, (2014)Understanding Mobile Users' Privacy Expectations: A Recommendation-Based Method Through Crowdsourcing., , , , , , и . IEEE Trans. Serv. Comput., 12 (2): 304-318 (2019)FLAM-PUF: A Response-Feedback-Based Lightweight Anti-Machine-Learning-Attack PUF., , , , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (11): 4433-4444 (2022)Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound., , , и . CCS, стр. 429-440. ACM, (2014)No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis., , , и . IEEE Symposium on Security and Privacy, стр. 414-432. IEEE Computer Society, (2016)Hidden Electricity Theft by Exploiting Multiple-Pricing Scheme in Smart Grids., , , , и . IEEE Trans. Inf. Forensics Secur., (2020)Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be., , , , , , , , , и 4 other автор(ы). CoRR, (2017)Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection., , , и . CoRR, (2019)Lost in Conversion: Exploit Data Structure Conversion with Attribute Loss to Break Android Systems., , , , , и . USENIX Security Symposium, стр. 5503-5520. USENIX Association, (2023)Identifying the BLE Misconfigurations of IoT Devices through Companion Mobile Apps., , , , , , , , и . SECON, стр. 343-351. IEEE, (2022)