Author of the publication

Turning Noises to Fingerprint-Free "Credentials": Secure and Usable Authentication for Drone Delivery.

, and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

F1 Lightning: HTAP as a Service., , , , , , , , , and 7 other author(s). Proc. VLDB Endow., 13 (12): 3313-3325 (2020)Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes., , and . USENIX Security Symposium, page 1559-1576. USENIX Association, (2023)Extracting clinical information from free-text of pathology and operation notes via Chinese natural language processing., , , , and . BIBM Workshops, page 593-597. IEEE, (2010)Software Cruising: A New Technology for Building Concurrent Software Monitor., , , and . Secure Cloud Computing, Springer, (2014)Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation., , , , , , , , , and . IEEE Trans. Mob. Comput., 19 (12): 2946-2964 (2020)Semi-supervised image manipulation localization with residual enhancement., , , , and . Expert Syst. Appl., (2024)Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs., , , , , and . NDSS, The Internet Society, (2019)Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring., , , , and . NDSS, The Internet Society, (2012)Attacking Graph-Based Classification without Changing Existing Connections., , and . ACSAC, page 951-962. ACM, (2020)Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study., , , , , and . IEEE Access, (2019)