Search for persons
X
?
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
2
HoneyIoT: Adaptive High-Interaction Honeypot for IoT Device..:
, In:
?
2022 IEEE Conference on Communications and Network Security (CNS) ,
3
A User-Friendly Two-Factor Authentication Method against Re..:
, In:
?
2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS) ,
4
Toward Cleansing Backdoored Neural Networks in Federated Le..:
, In:
?
2022 IEEE Conference on Communications and Network Security (CNS) ,
6
HoneyCam: Scalable High-Interaction Honeypot for IoT Camera..:
, In:
?
2022 IEEE Conference on Communications and Network Security (CNS) ,
7
Alexa Skills: Security Vulnerabilities and Countermeasures:
, In:
?
Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security ,
10
Recompose Event Sequences vs. Predict Next Events: A Novel ..:
, In:
?
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
15