A differentially private indoor localization scheme with fusion of WiFi and bluetooth fingerprints in edge computing X Zhang, F He, Q Chen, X Jiang, J Bao, T Ren, X Du Neural Computing and Applications 34 (6), 4111-4132, 2022 | 23 | 2022 |
An analysis of first-party cookie exfiltration due to cname redirections T Ren, A Wittman, L De Carli, D Davidson Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb), 2021 | 14 | 2021 |
Guided feature identification and removal for resource-constrained firmware R Williams, T Ren, L De Carli, L Lu, G Smith ACM Transactions on Software Engineering and Methodology (TOSEM) 31 (2), 1-25, 2021 | 11 | 2021 |
Breaking Embedded Software Homogeneity with Protocol Mutations T Ren, R Williams, S Ganguly, L De Carli, L Lu EAI SecureComm 2022, 2022 | 2 | 2022 |
Aloja: Breaking IoT Software Homogeneity with Protocol Mutations T Ren WORCESTER POLYTECHNIC INSTITUTE, 2021 | | 2021 |