Publisher
Springer Nature Switzerland
Reference31 articles.
1. Ban, X., Chen, C., Liu, S., Wang, Y., Zhang, J.: Deep-learnt features for twitter spam detection. In: 2018 International Symposium on Security and Privacy in Social Networks and Big Data, pp. 208–212. IEEE (2018)
2. Ban, X., Ding, M., Liu, S., Chen, C., Zhang, J., Xiang, Y.: TAESim: a testbed for IoT security analysis of trigger-action environment. In: Katsikas, S., et al. (eds.) European Symposium on Research in Computer Security, pp. 218–237. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-95484-0_14
3. Ban, X., Liu, S., Chen, C., Chua, C.: A performance evaluation of deep-learnt features for software vulnerability detection. Concurr. Comput. Pract. Exp. 31(19), e5103 (2019)
4. Bu, L., et al.: Systematically ensuring the confidence of real-time home automation IoT systems. ACM Trans. Cyber-Phys. Syst. 2(3), 1–23 (2018)
5. Celik, Z.B., McDaniel, P., Tan, G.: SOTERIA: automated IoT safety and security analysis. In: USENIX, Boston, MA, USA, pp. 147–158 (2018)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献