Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services., , and . DSN, page 287-298. IEEE Computer Society, (2014)Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion., , , , , , , , and . IEEE Symposium on Security and Privacy, page 952-966. IEEE, (2019)Cloud repository as a malicious service: challenge, identification and implication., , , , , , and . Cybersecurity, 1 (1): 14 (2018)Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search., , , , , , , , , and 2 other author(s). IEEE Symposium on Security and Privacy, page 707-723. IEEE Computer Society, (2016)Resident Evil: Understanding Residential IP Proxy as a Dark Service., , , , , , , , , and . IEEE Symposium on Security and Privacy, page 1185-1201. IEEE, (2019)Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service., , , , , , and . ACM Conference on Computer and Communications Security, page 1541-1552. ACM, (2016)Characterizing Long-tail SEO Spam on Cloud Web Hosting Services., , , , , and . WWW, page 321-332. ACM, (2016)Understanding iOS-based Crowdturfing Through Hidden UI Analysis., , , , , , and . USENIX Security Symposium, page 765-781. USENIX Association, (2019)Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos., , , , , , and . IEEE Security & Privacy, 15 (2): 42-49 (2017)Design of Literature Management Tool.. HCI (13), volume 9181 of Lecture Notes in Computer Science, page 230-240. Springer, (2015)