Author of the publication

SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX.

, , , , , , and . USENIX Security Symposium, page 4129-4146. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks., , and . IEEE Trans. Wirel. Commun., 7 (1): 354-363 (2008)Inverse transport calculations in optical imaging with subspace optimization algorithms., and . J. Comput. Phys., (2014)Blind Recognition of Touched Keys on Mobile Devices., , , , , and . ACM Conference on Computer and Communications Security, page 1403-1414. ACM, (2014)Attribute-based fine-grained access control with efficient revocation in cloud storage systems., , and . AsiaCCS, page 523-528. ACM, (2013)Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations., , , and . IEEE Trans. Parallel Distributed Syst., 24 (6): 1172-1181 (2013)Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices., , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 6 (2): 77:1-77:26 (2022)A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses., , , , , , , and . IEEE Commun. Surv. Tutorials, 24 (4): 2292-2328 (2022)Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids., , , , and . IEEE Netw., 31 (1): 59-63 (2017)Task-aware Similarity Learning for Event-triggered Time Series., , , , and . CoRR, (2022)MsDroid: Identifying Malicious Snippets for Android Malware Detection., , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (3): 2025-2039 (May 2023)