Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Representation of Chinese criminal law in the semantic web., , , and . ICNC-FSKD, page 1676-1680. IEEE, (2016)Adaptive replanning and control for magnetic microrobots tracking despite unknown blood velocity., , and . CDC, page 1789-1794. IEEE, (2021)Gutter design and selection for roof rainwater catchment systems., , , , , and . GHTC, page 226-231. IEEE, (2013)DPSelect: A Differential Privacy Based Guard Relay Selection Algorithm for Tor., , , and . PoPETs, 2019 (2): 166-186 (2019)Tempest: Temporal Dynamics in Anonymity Systems., , , , and . CoRR, (2018)Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks., , , , and . IEEE Symposium on Security and Privacy, page 977-992. IEEE Computer Society, (2017)RAPTOR: Routing Attacks on Privacy in Tor., , , , , , and . CoRR, (2015)AGRA: An Analysis-Generation-Ranking Framework for Automatic Abbreviation from Paper Titles., , , , , , , and . IJCAI, page 4221-4227. ijcai.org, (2017)Bamboozling Certificate Authorities with BGP., , , , and . USENIX Security Symposium, page 833-849. USENIX Association, (2018)Countering Malicious Processes with Process-DNS Association., , , , , , , , and . NDSS, The Internet Society, (2019)