Author of the publication

Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data.

, , , , , and . AsiaCCS, page 425-434. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Text Classification Can be Fooled., , , , , and . CoRR, (2017)A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation., , , and . TSA, page 8-16. IEEE, (2016)Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement., , , , , and . Inscrypt, volume 8567 of Lecture Notes in Computer Science, page 239-254. Springer, (2013)Corrections to "Detecting Bugs by Discovering Expectations and Their Violations"., , , , , and . IEEE Trans. Software Eng., 46 (1): 113 (2020)TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices., , , , and . IEEE Trans. Dependable Secur. Comput., 17 (1): 209-222 (2020)On the fine-grained fingerprinting threat to software-defined networks., , , , , and . Future Gener. Comput. Syst., (2020)MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 1165-1182. USENIX Association, (2020)Cecoin: A decentralized PKI mitigating MitM attacks., , , , , and . Future Gener. Comput. Syst., (2020)Network traffic monitoring, analysis and anomaly detection Guest Editorial., , , , and . IEEE Netw., 25 (3): 6-7 (2011)一种基于动态插桩的JavaScript反事实执行方法 (JavaScript Counterfactual Execution Method Based on Dynamic Instrumentation)., , , , and . 计算机科学, 44 (11): 22-26 (2017)