Sharing cyber threat intelligence: Does it really help?
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Dual-Band CMOS Down-Conversion Mixer Adopting Band-Switchable Transformer.
IEEE Trans. Circuits Syst. II Express Briefs, October, 2023
Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned.
IEEE Trans. Software Eng., April, 2023
A Comparative Study of Time Series Anomaly Detection Models for Industrial Control Systems.
Sensors, February, 2023
CMOS Variable-Gain Low-Noise Amplifier Adopting Transformer-Based Noise Cancelling Technique for 5G NR FR2 Applications.
IEEE Access, 2023
BASECOMP: A Comparative Analysis for Integrity Protection in Cellular Baseband Software.
Proceedings of the 32nd USENIX Security Symposium, 2023
Dog Bowel Pad Training IoT by Automatic Snack Feeder and Owner's Voice Compliment Speaker for Human Convenience.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023
Movie Box Office Prediction With Self-Supervised and Visually Grounded Pretraining.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
Enabling the Large-Scale Emulation of Internet of Things Firmware With Heuristic Workarounds.
IEEE Secur. Priv., 2021
BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Can We Create a Cross-Domain Federated Identity for the Industrial Internet of Things without Google?
IEEE Internet Things Mag., 2020
IBCS: Intent-Based Cloud Services for Security Applications.
,
,
,
,
,
,
,
,
,
,
IEEE Commun. Mag., 2020
Design of a Framework to Detect Device Spoofing Attacks Using Network Characteristics.
IEEE Consumer Electron. Mag., 2020
FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
A Framework for Managing User-defined Security Policies to Support Network Security Functions.
Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, 2018
CyTIME: Cyber Threat Intelligence ManagEment framework for automatically generating security rules.
Proceedings of the 13th International Conference on Future Internet Technologies, 2018
A flexible architecture for orchestrating network security functions to support high-level security policies.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Empirical Analysis of SSL/TLS Weaknesses in Real Websites: Who Cares?
Proceedings of the Information Security Applications - 17th International Workshop, 2016
PIkit: A New Kernel-Independent Processor-Interconnect Rootkit.
Proceedings of the 25th USENIX Security Symposium, 2016
A Framework for Detecting MAC and IP Spoofing Attacks with Network Characteristics.
Proceedings of the International Conference on Software Security and Assurance, 2016