Search for persons
X
?
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies ,
1
AI/ML, Graphs and Access Control: Towards Holistic Identity..:
, In:
?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security ,
2
POSTER: Seccomp profiling with Dynamic Analysis via ChatGPT..:
, In:
?
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering ,
4
On the Dual Nature of Necessity in Use of Rust Unsafe Code:
, In:
?
2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) ,
5
Large Language Models and Computer Security:
, In:
?
2023 IEEE 9th International Conference on Collaboration and Internet Computing (CIC) ,
6
A Pro-Active Defense Framework for IoT Systems:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
7
An Infection-Identifying and Self-Evolving System for IoT E..:
, In:
?
2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) ,
8
AI-Driven Selective Protection of Multimedia Data:
, In:
?
2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) ,
9
Similarities and Learnings from Ancient Literature on Block..:
, In:
?
2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) ,
10
StackVault: Protection from Untrusted Functions:
, In:
?
2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) ,
11
Energy Attacks on Mobile Devices:
, In:
?
2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) ,
12
Towards Deep Federated Defenses Against Malware in Cloud Ec..:
, In:
?
2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) ,
13
Malware Containment in Cloud:
, In:
?
The World Wide Web Conference ,
14