Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos., , , , , , and . IEEE Security & Privacy, 15 (2): 42-49 (2017)Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search., , , , , , , , , and 2 other author(s). IEEE Symposium on Security and Privacy, page 707-723. IEEE Computer Society, (2016)Understanding iOS-based Crowdturfing Through Hidden UI Analysis., , , , , , and . USENIX Security Symposium, page 765-781. USENIX Association, (2019)Resident Evil: Understanding Residential IP Proxy as a Dark Service., , , , , , , , , and . IEEE Symposium on Security and Privacy, page 1185-1201. IEEE, (2019)Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service., , , , , , and . ACM Conference on Computer and Communications Security, page 1541-1552. ACM, (2016)Characterizing Long-tail SEO Spam on Cloud Web Hosting Services., , , , , and . WWW, page 321-332. ACM, (2016)S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services., , and . DSN, page 287-298. IEEE Computer Society, (2014)Cloud repository as a malicious service: challenge, identification and implication., , , , , , and . Cybersecurity, 1 (1): 14 (2018)Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion., , , , , , , , and . IEEE Symposium on Security and Privacy, page 952-966. IEEE, (2019)Privacy-preserving and secure top-k query in two-tier wireless sensor network., and . GLOBECOM, page 335-341. IEEE, (2012)