BibTeX records: Sze Yiu Chau

download as .bib file

@article{DBLP:journals/imwut/MiaoG0CTLHH023,
  author       = {Yuchen Miao and
                  Chaojie Gu and
                  Zhenyu Yan and
                  Sze Yiu Chau and
                  Rui Tan and
                  Qi Lin and
                  Wen Hu and
                  Shibo He and
                  Jiming Chen},
  title        = {TouchKey: Touch to Generate Symmetric Keys by Skin Electric Potentials
                  Induced by Powerline Radiation},
  journal      = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.},
  volume       = {7},
  number       = {2},
  pages        = {70:1--70:21},
  year         = {2023},
  url          = {https://doi.org/10.1145/3596264},
  doi          = {10.1145/3596264},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imwut/MiaoG0CTLHH023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WuHPLPWHC23,
  author       = {Ka Lok Wu and
                  Man Hong Hue and
                  Ngai Man Poon and
                  Kin Man Leung and
                  Wai Yin Po and
                  Kin Ting Wong and
                  Sze Ho Hui and
                  Sze Yiu Chau},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Back to School: On the (In)Security of Academic VPNs},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {5737--5754},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/wu-ka-lok},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WuHPLPWHC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/WuHTC23,
  author       = {Ka Lok Wu and
                  Man Hong Hue and
                  Ka Fun Tang and
                  Sze Yiu Chau},
  editor       = {Ioana Boureanu and
                  Steve Schneider and
                  Bradley Reaves and
                  Nils Ole Tippenhauer},
  title        = {The Devil is in the Details: Hidden Problems of Client-Side Enterprise
                  Wi-Fi Configurators},
  booktitle    = {Proceedings of the 16th {ACM} Conference on Security and Privacy in
                  Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom,
                  29 May 2023 - 1 June 2023},
  pages        = {251--261},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558482.3590199},
  doi          = {10.1145/3558482.3590199},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/WuHTC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlposWKCLC22,
  author       = {Orestis Alpos and
                  Zhipeng Wang and
                  Alireza Kavousi and
                  Sze Yiu Chau and
                  Duc Viet Le and
                  Christian Cachin},
  title        = {{DSKE:} Digital Signature with Key Extraction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1753},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1753},
  timestamp    = {Mon, 29 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AlposWKCLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HueDLLMMXHCC21,
  author       = {Man Hong Hue and
                  Joyanta Debnath and
                  Kin Man Leung and
                  Li Li and
                  Mohsen Minaei and
                  M. Hammad Mazhar and
                  Kailiang Xian and
                  Md. Endadul Hoque and
                  Omar Chowdhury and
                  Sze Yiu Chau},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {All your Credentials are Belong to Us: On Insecure WPA2-Enterprise
                  Configurations},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {1100--1117},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484569},
  doi          = {10.1145/3460120.3484569},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HueDLLMMXHCC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DebnathCC21,
  author       = {Joyanta Debnath and
                  Sze Yiu Chau and
                  Omar Chowdhury},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {On Re-engineering the {X.509} {PKI} with Executable Specification
                  for Better Implementation Guarantees},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {1388--1404},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484793},
  doi          = {10.1145/3460120.3484793},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DebnathCC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YahyazadehCLHDI21,
  author       = {Moosa Yahyazadeh and
                  Sze Yiu Chau and
                  Li Li and
                  Man Hong Hue and
                  Joyanta Debnath and
                  Sheung Chiu Ip and
                  Chun Ngai Li and
                  Md. Endadul Hoque and
                  Omar Chowdhury},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Morpheus: Bringing The {(PKCS)} One To Meet the Oracle},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {2474--2496},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3485382},
  doi          = {10.1145/3460120.3485382},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YahyazadehCLHDI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DebnathCC20,
  author       = {Joyanta Debnath and
                  Sze Yiu Chau and
                  Omar Chowdhury},
  editor       = {Mauro Conti and
                  Jianying Zhou and
                  Emiliano Casalicchio and
                  Angelo Spognardi},
  title        = {When {TLS} Meets Proxy on Mobile},
  booktitle    = {Applied Cryptography and Network Security - 18th International Conference,
                  {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12147},
  pages        = {387--407},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57878-7\_19},
  doi          = {10.1007/978-3-030-57878-7\_19},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/DebnathCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GeC0L20,
  author       = {Huangyi Ge and
                  Sze Yiu Chau and
                  Bruno Ribeiro and
                  Ninghui Li},
  editor       = {Vassil Roussev and
                  Bhavani Thuraisingham and
                  Barbara Carminati and
                  Murat Kantarcioglu},
  title        = {Random Spiking and Systematic Evaluation of Defenses Against Adversarial
                  Examples},
  booktitle    = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security
                  and Privacy, New Orleans, LA, USA, March 16-18, 2020},
  pages        = {85--96},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3374664.3375736},
  doi          = {10.1145/3374664.3375736},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/GeC0L20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/GeCL20,
  author       = {Huangyi Ge and
                  Sze Yiu Chau and
                  Ninghui Li},
  title        = {MoNet: Impressionism As {A} Defense Against Adversarial Examples},
  booktitle    = {Second {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta,
                  GA, USA, October 28-31, 2020},
  pages        = {246--255},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TPS-ISA50397.2020.00040},
  doi          = {10.1109/TPS-ISA50397.2020.00040},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tpsisa/GeCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GeCGL0ZL19,
  author       = {Huangyi Ge and
                  Sze Yiu Chau and
                  Victor E. Gonsalves and
                  Huian Li and
                  Tianhao Wang and
                  Xukai Zou and
                  Ninghui Li},
  editor       = {David Balenson},
  title        = {Koinonia: verifiable e-voting with long-term privacy},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {270--285},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359804},
  doi          = {10.1145/3359789.3359804},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GeCGL0ZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChauYCKL19,
  author       = {Sze Yiu Chau and
                  Moosa Yahyazadeh and
                  Omar Chowdhury and
                  Aniket Kate and
                  Ninghui Li},
  title        = {Analyzing Semantic Correctness with Symbolic Execution: {A} Case Study
                  on PKCS{\#}1 v1.5 Signature Verification},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/analyzing-semantic-correctness-with-symbolic-execution-a-case-study-on-pkcs1-v1-5-signature-verification/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ChauYCKL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChauWWCKL18,
  author       = {Sze Yiu Chau and
                  Bincheng Wang and
                  Jianxiong Wang and
                  Omar Chowdhury and
                  Aniket Kate and
                  Ninghui Li},
  title        = {Why Johnny Can't Make Money With His Contents: Pitfalls of Designing
                  and Implementing Content Delivery Apps},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {236--251},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274752},
  doi          = {10.1145/3274694.3274752},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ChauWWCKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ChauCGGYFL18,
  author       = {Sze Yiu Chau and
                  Omar Chowdhury and
                  Victor E. Gonsalves and
                  Huangyi Ge and
                  Weining Yang and
                  Sonia Fahmy and
                  Ninghui Li},
  editor       = {Raheem Beyah and
                  Bing Chang and
                  Yingjiu Li and
                  Sencun Zhu},
  title        = {Adaptive Deterrence of {DNS} Cache Poisoning},
  booktitle    = {Security and Privacy in Communication Networks - 14th International
                  Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {255},
  pages        = {171--191},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01704-0\_10},
  doi          = {10.1007/978-3-030-01704-0\_10},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ChauCGGYFL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-01804,
  author       = {Huangyi Ge and
                  Sze Yiu Chau and
                  Ninghui Li},
  title        = {Random Spiking and Systematic Evaluation of Defenses Against Adversarial
                  Examples},
  journal      = {CoRR},
  volume       = {abs/1812.01804},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.01804},
  eprinttype    = {arXiv},
  eprint       = {1812.01804},
  timestamp    = {Tue, 01 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-01804.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/HoqueCCNL17,
  author       = {Md. Endadul Hoque and
                  Omar Chowdhury and
                  Sze Yiu Chau and
                  Cristina Nita{-}Rotaru and
                  Ninghui Li},
  title        = {Analyzing Operational Behavior of Stateful Protocol Implementations
                  for Detecting Semantic Bugs},
  booktitle    = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017},
  pages        = {627--638},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSN.2017.36},
  doi          = {10.1109/DSN.2017.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/HoqueCCNL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChauCHGKNL17,
  author       = {Sze Yiu Chau and
                  Omar Chowdhury and
                  Md. Endadul Hoque and
                  Huangyi Ge and
                  Aniket Kate and
                  Cristina Nita{-}Rotaru and
                  Ninghui Li},
  title        = {SymCerts: Practical Symbolic Execution for Exposing Noncompliance
                  in {X.509} Certificate Validation Implementations},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {503--520},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.40},
  doi          = {10.1109/SP.2017.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ChauCHGKNL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics