| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | A* | conf |
SP
|
| 2025 | A* | conf |
CCS
|
| 2025 | A* | conf |
NDSS
|
| 2025 | A* | conf |
Identifying Incoherent Search Sessions: Search Click Fraud Remediation Under Real-World Constraints.
SP
|
| 2025 | A* | conf |
CCS
|
| 2025 | A* | conf |
VillainNet: Targeted Poisoning Attacks Against SuperNets Along the Accuracy-Latency Pareto Frontier.
CCS
|
| 2024 | A* | conf |
USENIX Security Symposium
|
| 2024 | A* | conf |
USENIX Security Symposium
|
| 2024 | A* | conf |
SP
|
| 2023 | A* | conf |
USENIX Security Symposium
|
| 2023 | — | conf |
SecDev
|
| 2023 | A* | conf |
USENIX Security Symposium
|
| 2022 | A* | conf |
USENIX Security Symposium
|
| 2022 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2021 | A* | conf |
USENIX Security Symposium
|
| 2021 | A* | conf |
CCS
|
| 2021 | A* | conf |
CCS
|
| 2021 | A* | conf |
USENIX Security Symposium
|
| 2021 | J | jnl |
IEEE Secur. Priv.
|
| 2021 | A* | conf |
NDSS
|
| 2020 | J | jnl |
CoRR
|
| 2020 | A | conf |
ACSAC
|
| 2020 | A* | conf |
SP
|
| 2019 | A* | conf |
NDSS
|
| 2019 | A* | conf |
USENIX Security Symposium
|
| 2018 | J | jnl |
Comput. Secur.
|
| 2018 | A* | conf |
NDSS
|
| 2018 | J | jnl |
Comput. Secur.
|
| 2017 | J | jnl |
Digit. Investig.
|
| 2017 | A | conf |
ACSAC
|
| 2017 | A* | conf |
NDSS
|
| 2016 | — | conf |
SoCC
|
| 2016 | — | — |
|
| 2016 | — | conf |
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic.
WOOT
|
| 2016 | A | conf |
ACSAC
|
| 2016 | A* | conf |
ASPLOS
|
| 2016 | A* | conf |
USENIX Security Symposium
|
| 2016 | A | conf |
DSN
|
| 2015 | A* | conf |
CCS
|
| 2015 | A* | conf |
CCS
|
| 2015 | A* | conf |
CCS
|
| 2015 | — | conf |
SoCC
|
| 2015 | A | conf |
Middleware
|
| 2014 | A* | conf |
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse.
USENIX Security Symposium
|
| 2014 | A | conf |
DSN
|
| 2011 | — | conf |
CyCon
|