From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos., , , , , , и . IEEE Secur. Priv., 15 (2): 42-49 (2017)Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels at Scale., , , , , , и . CoRR, (2022)Learning Security Classifiers with Verified Global Robustness Properties., , , , , и . CCS, стр. 477-494. ACM, (2021)Understanding iOS-based Crowdturfing Through Hidden UI Analysis., , , , , , и . USENIX Security Symposium, стр. 765-781. USENIX Association, (2019)OS-Aware Vulnerability Prioritization via Differential Severity Analysis., , , и . USENIX Security Symposium, стр. 395-412. USENIX Association, (2022)Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service., , , , , , и . CCS, стр. 1541-1552. ACM, (2016)RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection., , , , , , , и . CCS, стр. 1837-1852. ACM, (2020)Characterizing Long-tail SEO Spam on Cloud Web Hosting Services., , , , , и . WWW, стр. 321-332. ACM, (2016)Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks., , , , , и . NDSS, The Internet Society, (2021)Analyzing Ground-Truth Data of Mobile Gambling Scams., , , , , , и . SP, стр. 2176-2193. IEEE, (2022)