Author of the publication

Curtain: Keep Your Hosts Away from USB Attacks.

, , and . ISC, volume 10599 of Lecture Notes in Computer Science, page 455-471. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table., , and . Trustcom/BigDataSE/ISPA, page 394-401. IEEE, (2016)An Adaptive Service Strategy Based on User Rating in P2P., , , and . GCC, volume 3795 of Lecture Notes in Computer Science, page 860-870. Springer, (2005)A Worm Containment Model Based on Neighbor-Alarm., , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 449-457. Springer, (2007)PerformTrust: Trust model integrated past and current performance in P2P file sharing systems., , , and . AICCSA, page 718-725. IEEE Computer Society, (2008)Malware Behavior Capturing Based on Taint Propagation and Stack Backtracing., , and . TrustCom, page 328-335. IEEE Computer Society, (2011)Function Risk Assessment Under Memory Leakage., , , , and . NaNA, page 284-291. IEEE, (2018)Occupational Therapy Assessment for Upper Limb Rehabilitation: A Multisensor-Based Approach., , , , and . Frontiers Digit. Health, (2021)Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization., , , , , , and . CCS, page 2858-2874. ACM, (2021)Robot-Assisted quantitative assessment of axis misalignment of wrist joint., , , , , , and . RCAR, page 1397-1401. IEEE, (2021)JTaint: Finding Privacy-Leakage in Chrome Extensions., , , , and . ACISP, volume 12248 of Lecture Notes in Computer Science, page 563-583. Springer, (2020)