Author of the publication

Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf.

, , , , , , and . IEEE Symposium on Security and Privacy, page 655-674. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

iDEA: Static Analysis on the Security of Apple Kernel Drivers., , , and . ACM Conference on Computer and Communications Security, page 1185-1202. ACM, (2020)Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews., , , , , , , , and . CCS, page 829-844. ACM, (2017)OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS., , , , and . NDSS, The Internet Society, (2018)Look Before You Leap: Safe Model-Based Reinforcement Learning with Human Intervention., , , , , and . CoRL, volume 164 of Proceedings of Machine Learning Research, page 332-341. PMLR, (2021)Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf., , , , , , and . IEEE Symposium on Security and Privacy, page 655-674. IEEE Computer Society, (2016)Automated anterior segment OCT image analysis for Angle Closure Glaucoma mechanisms classification., , , , , , , and . Comput. Methods Programs Biomed., (2016)SimROD: A Simple Adaptation Method for Robust Object Detection., , , , and . ICCV, page 3550-3559. IEEE, (2021)Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment., , , , , , , , and . USENIX Security Symposium, page 593-608. USENIX Association, (2017)Histopathologic Cancer Detection with Hybrid Deep Learning model., , , and . ISAIMS, page 505-508. ACM, (2023)Saliency-Based Defect Detection in Industrial Images by Using Phase Spectrum., , , , and . IEEE Trans. Ind. Informatics, 10 (4): 2135-2145 (2014)