publication venue for
- Games, Dollars, Splits: A Game-Theoretic Analysis of Split Manufacturing. 16:5077-5092. 2021
- On the Information Leakage in Private Information Retrieval Systems. 15:2999-3012. 2020
- Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis. 13:1838-1853. 2018
- LinkScope: Toward Detecting Target Link Flooding Attacks. 13:2423-2438. 2018
- SMASheD: Sniffing and Manipulating Android Sensor Data for Offensive Purposes. 12:901-913. 2017
- Identifying User-Input Privacy in Mobile Applications at a Large Scale. 12:647-661. 2017
- Secrecy Analysis of MIMO Wiretap Channels With Low-Complexity Receivers Under Imperfect Channel Estimation. 12:257-270. 2017
- Testing the Trustworthiness of IC Testing: An Oracle-Less Attack on IC Camouflaging. 12:2668-2682. 2017
- Rethinking Permission Enforcement Mechanism on Mobile Systems. 11:2227-2240. 2016
- Neural Markers of Cybersecurity: An fMRI Study of Phishing and Malware Warnings. 11:1970-1983. 2016
- A First Step Toward Network Security Virtualization: From Concept To Prototype. 10:2236-2249. 2015
- Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware. 10:2270-2283. 2015
- Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps. 9:1828-1842. 2014
- Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers. 8:1280-1293. 2013
- Acoustic Eavesdropping Attacks on Constrained Wireless Device Pairing. 8:563-577. 2013
- Active User-Side Evil Twin Access Point Detection Using Statistical Techniques. 7:1638-1651. 2012
- Security Embedding Codes. 7:148-159. 2012
- Secure Device Pairing Based on a Visual Channel: Design and Usability Study. 6:28-38. 2011
- Noninteractive Self-Certification for Long-Lived Mobile Ad Hoc Networks. 4:946-955. 2009
- Enhancing Secrecy With Multi-Antenna Transmission in Wireless Ad Hoc Networks 2013
- A Large-Scale Empirical Study of Conficker 2012