Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Sze Yiu Chau
@article{DBLP:journals/imwut/MiaoG0CTLHH023, author = {Yuchen Miao and Chaojie Gu and Zhenyu Yan and Sze Yiu Chau and Rui Tan and Qi Lin and Wen Hu and Shibo He and Jiming Chen}, title = {TouchKey: Touch to Generate Symmetric Keys by Skin Electric Potentials Induced by Powerline Radiation}, journal = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.}, volume = {7}, number = {2}, pages = {70:1--70:21}, year = {2023}, url = {https://doi.org/10.1145/3596264}, doi = {10.1145/3596264}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imwut/MiaoG0CTLHH023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WuHPLPWHC23, author = {Ka Lok Wu and Man Hong Hue and Ngai Man Poon and Kin Man Leung and Wai Yin Po and Kin Ting Wong and Sze Ho Hui and Sze Yiu Chau}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Back to School: On the (In)Security of Academic VPNs}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5737--5754}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/wu-ka-lok}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/WuHPLPWHC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/WuHTC23, author = {Ka Lok Wu and Man Hong Hue and Ka Fun Tang and Sze Yiu Chau}, editor = {Ioana Boureanu and Steve Schneider and Bradley Reaves and Nils Ole Tippenhauer}, title = {The Devil is in the Details: Hidden Problems of Client-Side Enterprise Wi-Fi Configurators}, booktitle = {Proceedings of the 16th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023}, pages = {251--261}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3558482.3590199}, doi = {10.1145/3558482.3590199}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/WuHTC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlposWKCLC22, author = {Orestis Alpos and Zhipeng Wang and Alireza Kavousi and Sze Yiu Chau and Duc Viet Le and Christian Cachin}, title = {{DSKE:} Digital Signature with Key Extraction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1753}, year = {2022}, url = {https://eprint.iacr.org/2022/1753}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AlposWKCLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HueDLLMMXHCC21, author = {Man Hong Hue and Joyanta Debnath and Kin Man Leung and Li Li and Mohsen Minaei and M. Hammad Mazhar and Kailiang Xian and Md. Endadul Hoque and Omar Chowdhury and Sze Yiu Chau}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {1100--1117}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484569}, doi = {10.1145/3460120.3484569}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HueDLLMMXHCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DebnathCC21, author = {Joyanta Debnath and Sze Yiu Chau and Omar Chowdhury}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {On Re-engineering the {X.509} {PKI} with Executable Specification for Better Implementation Guarantees}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {1388--1404}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484793}, doi = {10.1145/3460120.3484793}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DebnathCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YahyazadehCLHDI21, author = {Moosa Yahyazadeh and Sze Yiu Chau and Li Li and Man Hong Hue and Joyanta Debnath and Sheung Chiu Ip and Chun Ngai Li and Md. Endadul Hoque and Omar Chowdhury}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Morpheus: Bringing The {(PKCS)} One To Meet the Oracle}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {2474--2496}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3485382}, doi = {10.1145/3460120.3485382}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YahyazadehCLHDI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DebnathCC20, author = {Joyanta Debnath and Sze Yiu Chau and Omar Chowdhury}, editor = {Mauro Conti and Jianying Zhou and Emiliano Casalicchio and Angelo Spognardi}, title = {When {TLS} Meets Proxy on Mobile}, booktitle = {Applied Cryptography and Network Security - 18th International Conference, {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12147}, pages = {387--407}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57878-7\_19}, doi = {10.1007/978-3-030-57878-7\_19}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/DebnathCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/GeC0L20, author = {Huangyi Ge and Sze Yiu Chau and Bruno Ribeiro and Ninghui Li}, editor = {Vassil Roussev and Bhavani Thuraisingham and Barbara Carminati and Murat Kantarcioglu}, title = {Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples}, booktitle = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 16-18, 2020}, pages = {85--96}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3374664.3375736}, doi = {10.1145/3374664.3375736}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/GeC0L20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/GeCL20, author = {Huangyi Ge and Sze Yiu Chau and Ninghui Li}, title = {MoNet: Impressionism As {A} Defense Against Adversarial Examples}, booktitle = {Second {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta, GA, USA, October 28-31, 2020}, pages = {246--255}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TPS-ISA50397.2020.00040}, doi = {10.1109/TPS-ISA50397.2020.00040}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/GeCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GeCGL0ZL19, author = {Huangyi Ge and Sze Yiu Chau and Victor E. Gonsalves and Huian Li and Tianhao Wang and Xukai Zou and Ninghui Li}, editor = {David Balenson}, title = {Koinonia: verifiable e-voting with long-term privacy}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {270--285}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359804}, doi = {10.1145/3359789.3359804}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GeCGL0ZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ChauYCKL19, author = {Sze Yiu Chau and Moosa Yahyazadeh and Omar Chowdhury and Aniket Kate and Ninghui Li}, title = {Analyzing Semantic Correctness with Symbolic Execution: {A} Case Study on PKCS{\#}1 v1.5 Signature Verification}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/analyzing-semantic-correctness-with-symbolic-execution-a-case-study-on-pkcs1-v1-5-signature-verification/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ChauYCKL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChauWWCKL18, author = {Sze Yiu Chau and Bincheng Wang and Jianxiong Wang and Omar Chowdhury and Aniket Kate and Ninghui Li}, title = {Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {236--251}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274752}, doi = {10.1145/3274694.3274752}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ChauWWCKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ChauCGGYFL18, author = {Sze Yiu Chau and Omar Chowdhury and Victor E. Gonsalves and Huangyi Ge and Weining Yang and Sonia Fahmy and Ninghui Li}, editor = {Raheem Beyah and Bing Chang and Yingjiu Li and Sencun Zhu}, title = {Adaptive Deterrence of {DNS} Cache Poisoning}, booktitle = {Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {255}, pages = {171--191}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01704-0\_10}, doi = {10.1007/978-3-030-01704-0\_10}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ChauCGGYFL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-01804, author = {Huangyi Ge and Sze Yiu Chau and Ninghui Li}, title = {Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples}, journal = {CoRR}, volume = {abs/1812.01804}, year = {2018}, url = {http://arxiv.org/abs/1812.01804}, eprinttype = {arXiv}, eprint = {1812.01804}, timestamp = {Tue, 01 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-01804.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/HoqueCCNL17, author = {Md. Endadul Hoque and Omar Chowdhury and Sze Yiu Chau and Cristina Nita{-}Rotaru and Ninghui Li}, title = {Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs}, booktitle = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017}, pages = {627--638}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSN.2017.36}, doi = {10.1109/DSN.2017.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/HoqueCCNL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChauCHGKNL17, author = {Sze Yiu Chau and Omar Chowdhury and Md. Endadul Hoque and Huangyi Ge and Aniket Kate and Cristina Nita{-}Rotaru and Ninghui Li}, title = {SymCerts: Practical Symbolic Execution for Exposing Noncompliance in {X.509} Certificate Validation Implementations}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {503--520}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.40}, doi = {10.1109/SP.2017.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ChauCHGKNL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.