Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An empirical characterization of IFTTT: ecosystem, usage, and performance., , , and . IMC, page 398-404. ACM, (2017)Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home., , , , , and . CoRR, (2018)Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment., , , , , , , , and . USENIX Security Symposium, page 593-608. USENIX Association, (2017)Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations., , , , , , and . NDSS, The Internet Society, (2018)Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems., , , , , and . IEEE Symposium on Security and Privacy, page 1381-1396. IEEE, (2019)Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be., , , , , , , , , and 4 other author(s). CoRR, (2017)Resident Evil: Understanding Residential IP Proxy as a Dark Service., , , , , , , , , and . IEEE Symposium on Security and Privacy, page 1185-1201. IEEE, (2019)Understanding iOS-based Crowdturfing Through Hidden UI Analysis., , , , , , and . USENIX Security Symposium, page 765-781. USENIX Association, (2019)Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs., , , , , , , , and . NDSS, The Internet Society, (2019)SMig: Stream Migration Extension for HTTP/2., , and . CoNEXT, page 121-128. ACM, (2016)