Author of the publication

How Risky Are Real Users' IFTTT Applets?

, , , , , , and . SOUPS @ USENIX Security Symposium, page 505-529. USENIX Association, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study on spacing optimization for traffic flow detector., , , , , and . ITSC, page 593-598. IEEE, (2010)Urban residents travel analysis based on mobile communication data., , , , , , , and . ITSC, page 1487-1492. IEEE, (2013)Some practical vehicle speed estimation methods by a single traffic magnetic sensor., , , , and . ITSC, page 1566-1573. IEEE, (2011)Doppler Shift Estimation for High-Speed Railway Scenario., , , , and . VTC Spring, page 1-5. IEEE, (2016)SN-UTIA: A sensor network for urban traffic information acquisition., , , , , and . Intelligent Vehicles Symposium, page 566-571. IEEE, (2010)Application of Petri Net with Objects in Safety System Process Modeling., , , and . CSREA EEE, page 120-126. CSREA Press, (2005)Multi-Target Defect Identification for Railway Track Line Based on Image Processing and Improved YOLOv3 Model., , , , and . IEEE Access, (2020)Research on Topological Risk of Expressway Networks., and . ISCID (1), page 486-491. IEEE, (2017)Multistate Reliability Evaluation of Bogie on High Speed Railway Vehicle Based on the Network Flow Theory., , , and . Int. J. Softw. Eng. Knowl. Eng., 28 (4): 431-452 (2018)An Online Quantified Safety Assessment Method for Train Service State Based on Safety Region Estimation and Hybrid Intelligence Technologies., , , , and . Int. J. Softw. Eng. Knowl. Eng., 25 (3): 493-512 (2015)