Weijia He

Orcid: 0009-0002-1189-7063

According to our database1, Weijia He authored at least 15 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Massive parallelization of multilevel fast multipole algorithm for 3-D electromagnetic scattering problems on SW26010 many-core cluster.
J. Supercomput., May, 2024

Contextualizing Interpersonal Data Sharing in Smart Homes.
Proc. Priv. Enhancing Technol., 2024

Challenges and opportunities in onboarding smart-home devices.
Proceedings of the 25th International Workshop on Mobile Computing Systems and Applications, 2024

Device Discovery in the Smart Home Environment.
Proceedings of the IEEE Security and Privacy, 2024

Well-intended but half-hearted: Hosts' consideration of guests' privacy using smart devices on rental properties.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024

Can Allowlists Capture the Variability of Home IoT Device Network Behavior?
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

2023
The HandyTech's Coming Between 1 and 4: Privacy Opportunities and Challenges for the IoT Handyperson.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023

2021
Efficient parallelization of multilevel fast multipole algorithm for electromagnetic simulation on many-core SW26010 processor.
J. Supercomput., 2021

SoK: Context Sensing for Access Control in the Adversarial Home IoT.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
Trace2TAP: Synthesizing Trigger-Action Programs from Traces of Behavior.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

2019
When Smart Devices Are Stupid: Negative Experiences Using Home Smart Devices.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

AutoTap: synthesizing and repairing trigger-action programs using LTL properties.
Proceedings of the 41st International Conference on Software Engineering, 2019

How Users Interpret Bugs in Trigger-Action Programming.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Rethinking Access Control and Authentication for the Home Internet of Things (IoT).
Proceedings of the 27th USENIX Security Symposium, 2018

2016
Detecting Malicious Server Based on Server-to-Server Realation Graph.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016


  Loading...