Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rapid and parallel content screening for detecting transformed data exposure., , , and . INFOCOM Workshops, page 191-196. IEEE, (2015)Role-playing game for studying user behaviors in security: A case study on email secrecy., , , , and . CollaborateCom, page 18-26. ICST / IEEE, (2014)Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming., , , and . IEEE Trans. Dependable Sec. Comput., 13 (4): 474-487 (2016)Analysis of Code Heterogeneity for High-Precision Classification of Repackaged Malware., , , and . IEEE Symposium on Security and Privacy Workshops, page 262-271. IEEE Computer Society, (2016)Novel meshes for multivariate interpolation and approximation., , , , , , , , , and 2 other author(s). ACM Southeast Regional Conference, page 13:1-13:7. ACM, (2018)Towards publishing recommendation data with predictive anonymization., , , and . AsiaCCS, page 24-35. ACM, (2010)Building robust authentication systems with activity-based personal questions., , , and . SafeConfig, page 19-24. ACM, (2009)Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths., , and . ACM Conference on Computer and Communications Security, page 401-413. ACM, (2015)User-Assisted Host-Based Detection of Outbound Malware Traffic., , , , and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 293-307. Springer, (2009)Point-Based Trust: Define How Much Privacy Is Worth., , , and . ICICS, volume 4307 of Lecture Notes in Computer Science, page 190-209. Springer, (2006)