Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bug Searching in Smart Contract., , , and . CoRR, (2019)A Stackelberg Game and Markov Modeling of Moving Target Defense., , , and . GameSec, volume 10575 of Lecture Notes in Computer Science, page 315-335. Springer, (2017)A signaling game model for moving target defense., , , , and . INFOCOM, page 1-9. IEEE, (2017)Blockchain Meets COVID-19: A Framework for Contact Information Sharing and Risk Notification System., , , , , , , and . MASS, page 269-277. IEEE, (2021)A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing., , , , , , and . AsiaCCS, page 658-663. ACM, (2019)Stealthy attacks meets insider threats: A three-player game model., , , , and . MILCOM, page 25-30. IEEE, (2015)Field trial of broker-based multi-domain software-defined heterogeneous wireline-wireless-optical networks., , , , , , , , , and . OFC, page 1-3. IEEE, (2015)Stealthy attacks with insider information: A game theoretic model with asymmetric feedback., , , , and . MILCOM, page 277-282. IEEE, (2016)Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference., , , , , , , and . CCS, page 337-350. ACM, (2021)TraceDroid: Detecting Android Malware by Trace of Privacy Leakage., , , , , , , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 466-478. Springer, (2022)