Author of the publication

NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System.

, and . NDSS, The Internet Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Shadow attacks: automatically evading system-call-behavior based malware detection., , , , and . Journal in Computer Virology, 8 (1-2): 1-13 (2012)NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System., and . NDSS, The Internet Society, (2013)CATS: Characterizing automation of Twitter spammers., , , , and . COMSNETS, page 1-10. IEEE, (2013)EFFORT: Efficient and effective bot malware detection., , and . INFOCOM, page 2846-2850. IEEE, (2012)Model checking invariant security properties in OpenFlow., , , , and . ICC, page 1974-1979. IEEE, (2013)AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization., , , and . ICDCS, page 112-123. IEEE Computer Society, (2013)UIPicker: User-Input Privacy Identification in Mobile Applications., , , , , and . USENIX Security Symposium, page 993-1008. USENIX Association, (2015)Uncovering HTTP Header Inconsistencies and the Impact on Desktop/Mobile Websites., , and . WWW, page 247-256. ACM, (2018)Rethinking Permission Enforcement Mechanism on Mobile Systems., , , and . IEEE Trans. Information Forensics and Security, 11 (10): 2227-2240 (2016)Identifying User-Input Privacy in Mobile Applications at a Large Scale., , , , , , , and . IEEE Trans. Information Forensics and Security, 12 (3): 647-661 (2017)