Search for persons
X
?
Proceedings of the IEEE/ACM 46th International Conference on Software Engineering ,
1
DEMISTIFY: Identifying On-device Machine Learning Models St..:
, In:
?
Proceedings of the IEEE/ACM 46th International Conference on Software Engineering ,
2
Attention! Your Copied Data is Under Monitoring: A Systemat..:
, In:
?
2024 IEEE/ACM 46th International Conference on Software Engineering (ICSE) ,
3
DeMistify: Identifying On-Device Machine Learning Models St..:
, In:
?
Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses ,
4
Extracting Threat Intelligence From Cheat Binaries For Anti..:
, In:
?
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking ,
5
Exploiting Contactless Side Channels in Wireless Charging P..:
, In:
?
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security ,
6
Uncovering Vulnerabilities of Bluetooth Low Energy IoT from..:
, In:
?
2023 IEEE Symposium on Security and Privacy (SP) ,
7
Uncovering User Interactions on Smartphones via Contactless..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
8
Detecting and Measuring Misconfigured Manifests in Android ..:
, In:
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
9
PeriScope : Comprehensive Vulnerability Analysis of Mobi..:
, In:
?
Abstract Proceedings of the 2021 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems ,
12
A Measurement Study of Wechat Mini-Apps:
, In:
?
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
14
An empirical study of potentially malicious third-party lib..:
, In:
?
2020 IEEE Symposium on Security and Privacy (SP) ,
15