From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Learning Security Classifiers with Verified Global Robustness Properties., , , , , и . CCS, стр. 477-494. ACM, (2021)Understanding iOS-based Crowdturfing Through Hidden UI Analysis., , , , , , и . USENIX Security Symposium, стр. 765-781. USENIX Association, (2019)Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks., , , , , и . NDSS, The Internet Society, (2021)OS-Aware Vulnerability Prioritization via Differential Severity Analysis., , , и . USENIX Security Symposium, стр. 395-412. USENIX Association, (2022)Analyzing Ground-Truth Data of Mobile Gambling Scams., , , , , , и . SP, стр. 2176-2193. IEEE, (2022)RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection., , , , , , , и . CCS, стр. 1837-1852. ACM, (2020)Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search., , , , , , , , , и 2 other автор(ы). IEEE Symposium on Security and Privacy, стр. 707-723. IEEE Computer Society, (2016)Resident Evil: Understanding Residential IP Proxy as a Dark Service., , , , , , , , , и . IEEE Symposium on Security and Privacy, стр. 1185-1201. IEEE, (2019)Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service., , , , , , и . CCS, стр. 1541-1552. ACM, (2016)Characterizing Long-tail SEO Spam on Cloud Web Hosting Services., , , , , и . WWW, стр. 321-332. ACM, (2016)