Author of the publication

Identifying privacy weaknesses from multi-party trigger-action integration platforms.

, , , , , , , and . ISSTA, page 2-15. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Parallel Evaluation of Game Trees., and . SPAA, page 409-420. ACM, (1989)Normal form and adaptive control of mimo non-canonical neural network systems., , , and . ACC, page 3056-3061. IEEE, (2016)Reduced-Order Filters-Based Adaptive Backstepping Control for Perturbed Nonlinear Systems., , , and . IEEE Trans. Cybern., 52 (8): 8388-8398 (2022)A Phase Retrieval Method for 3D Shape Measurement of High-Reflectivity Surface Based on π Phase-Shifting Fringes., and . Sensors, 23 (21): 8848 (October 2023)Comprehensive Performance Analysis of Two-Way Multi-Relay System with Amplify-and-Forward Relaying., , , , and . IEICE Trans. Commun., 97-B (3): 666-673 (2014)The Variance of Two Game Tree Algorithms.. J. Algorithms, 28 (1): 21-39 (1998)An adaptive disturbance rejection control scheme for multivariable nonlinear systems., , , and . Int. J. Control, 89 (3): 594-610 (2016)A 2-Dimension Force-Directed Scheduling Algorithm for Register-File-Connectivity Clustered VLIW Architecture., , , , and . ASAP, page 371-376. IEEE Computer Society, (2007)LASF: A Flow Scheduling Policy in Stateful Packet Inspection Systems., , , and . ISCC, page 87-93. IEEE Computer Society, (2007)Privacy-Preserving and Fairness-Aware Federated Learning for Critical Infrastructure Protection and Resilience., , , , , , , , and . WWW, page 2986-2997. ACM, (2024)