Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unauthorized Cross-App Resource Access on MAC OS X and iOS., , , , , , , and . CoRR, (2015)Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services., , , , , , and . ACM Conference on Computer and Communications Security, page 978-989. ACM, (2014)Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS., , , , , , , and . ACM Conference on Computer and Communications Security, page 31-43. ACM, (2015)Robust and Consistent Clustering Recovery via SDP Approaches., , and . DSW, page 46-50. IEEE, (2018)Fundamental limits and achievable strategies for low energy compressed sensing with applications in wireless communication., , and . SPAWC, page 1-6. IEEE, (2016)Quadratically Constrained Channels with Causal Adversaries., , , , and . ISIT, page 621-625. IEEE, (2018)"Information-Friction" for Noiseless Compressive Sensing Decoding.. CoRR, (2014)Filtering for Malice Through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level., , , , , and . RAID, volume 10453 of Lecture Notes in Computer Science, page 167-191. Springer, (2017)Ghost Installer in the Shadow: Security Analysis of App Installation on Android., , , , , , , , , and . DSN, page 403-414. IEEE Computer Society, (2017)Robustness and Consistency in Linear Quadratic Control with Untrusted Predictions., , , , , , and . Proc. ACM Meas. Anal. Comput. Syst., 6 (1): 18:1-18:35 (2022)