What I Say Means What I Do: Risk Concerns and Mobile Application-Selection Behaviors.
Hum. Factors, 2022
MoNet: Impressionism As A Defense Against Adversarial Examples.
Proceedings of the Second IEEE International Conference on Trust, 2020
Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Cybersecurity for Android Applications: Permissions in Android 5 and 6.
Int. J. Hum. Comput. Interact., 2019
Koinonia: verifiable e-voting with long-term privacy.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples.
CoRR, 2018
Influence of privacy priming and security framing on mobile app selection.
Comput. Secur., 2018
Adaptive Deterrence of DNS Cache Poisoning.
Proceedings of the Security and Privacy in Communication Networks, 2018
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
P<sup>3</sup>DB 3.0: From plant phosphorylation sites to protein networks.
Nucleic Acids Res., 2014