Search for persons
X
?
2024 IEEE Global Engineering Education Conference (EDUCON) ,
1
Evaluating the Efficacy of Productivity Tools in Engineerin..:
, In:
?
2024 International Conference on Computing, Networking and Communications (ICNC) ,
2
Unified View of IoT and CPS Security and Privacy:
, In:
?
2024 International Conference on Computing, Networking and Communications (ICNC) ,
3
On Building Automation Systems and Attacks:
, In:
?
2023 International Conference on Computing, Networking and Communications (ICNC) ,
4
On False Data Injection Attack against Building Automation ..:
, In:
?
IEEE INFOCOM 2023 - IEEE Conference on Computer Communications ,
5
A Comprehensive and Long-term Evaluation of Tor V3 Onion Se..:
, In:
?
Neural Information Processing; Lecture Notes in Computer Science ,
6
A Deep Learning Framework with Pruning RoI Proposal for Den..:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
7
FITS: Matching Camera Fingerprints Subject to Software Nois..:
, In:
?
2023 IEEE International Conference on E-health Networking, Application & Services (Healthcom) ,
8
A Greedy Algorithm-Based Self-Training Pipeline for Expansi..:
, In:
?
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications ,
9
Towards an Efficient Defense against Deep Learning based We..:
, In:
?
ICC 2022 - IEEE International Conference on Communications ,
10
BBS: A Blockchain Big-Data Sharing System:
, In:
?
2022 IEEE Conference on Communications and Network Security (CNS) ,
11
On Security of Proof-of-Policy (PoP) in the Execute-Order-V..:
, In:
?
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications ,
12
FUME: Fuzzing Message Queuing Telemetry Transport Brokers:
, In:
?
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications ,
13
Large-scale Evaluation of Malicious Tor Hidden Service Dire..:
, In:
?
2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS) ,
14
Implication of Animation on Android Security:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
15