Publications
2025
- INFOCOMFormally Verifying the State Machine of TLS 1.3 Handshake in OpenSSLIn IEEE Conference on Computer Communications, 2025
- TIFSVulsEye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox FuzzingIEEE Transactions on Information Forensics and Security, 2025
2024
2023
- ICMLAAn Investigation of Large Language Models for Real-World Hate Speech DetectionIn IEEE International Conference on Machine Learning and Applications, 2023
- ASONAMUnderstanding and Analyzing COVID-19-related Online Hate Propagation Through Hateful Memes Shared on TwitterIn IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2023
- TMCWiFiLeaks: Exposing Stationary Human Presence Through a Wall with Commodity Mobile DevicesIEEE Transactions on Mobile Computing, 2023
- SmartSPExploring Vulnerabilities in Voice Command Skills for Connected VehiclesIn EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles, 2023
2022
2021
2020
- Book ChapterMitigating the CacheKit AttackFrontiers in Hardware Security and Trust: Theory, Design and Practice, 2020
2019
- US PatentSystems and methods for authenticating caller identity and call request header information for outbound telephony communications2019US Patent 10,447,481
2018
2017
2016
2015
2014
2013
- Book ChapterExamining Social Dynamics and Malware Secrets to Mitigate Net-centric AttacksIn Hackers and Hacking: A Reference Handbook, 2013
2012
- ESORICS