Author of the publication

Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising.

, , , , and . ACM Conference on Computer and Communications Security, page 129-140. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding Characteristics of Available Bandwidth in Wireless Environment., , and . ANT/MobiWIS, volume 5 of Procedia Computer Science, page 248-254. Elsevier, (2011)A Comparison of Rule Extraction for Different Recurrent Neural Network Models and Grammatical Complexity., , , , , and . CoRR, (2018)Exploiting Insurance Telematics for Fun and Profit., , , , , , , and . CoRR, (2016)FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities., , , , , and . USENIX Security Symposium, page 781-797. USENIX Association, (2018)All Your Clicks Belong to Me: Investigating Click Interception on the Web., , , , and . USENIX Security Symposium, page 941-957. USENIX Association, (2019)Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices., , , , , , , , and . ACSAC, page 339-349. ACM, (2017)CGRED: class guided random early discarding., , , , and . IPCCC, page 179-185. IEEE, (2004)CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump., , , , , and . ACM Conference on Computer and Communications Security, page 529-540. ACM, (2016)Your Online Interests: Pwned! A Pollution Attack Against Targeted Advertising., , , , and . ACM Conference on Computer and Communications Security, page 129-140. ACM, (2014)Agent based approach towards energy aware routing in wireless sensor networks., , and . SMC, page 2149-2154. IEEE, (2007)