Follow
Li Li
Title
Cited by
Cited by
Year
Coordinated multi-robot planning while preserving individual privacy
L Li, A Bayuelo, L Bobadilla, T Alam, DA Shell
2019 International Conference on Robotics and Automation (ICRA), 2188-2194, 2019
202019
A formal security analysis of ZigBee (1.0 and 3.0)
L Li, P Podder, E Hoque
Proceedings of the 7th Symposium on Hot Topics in the Science of Security, 1-11, 2020
92020
All your credentials are belong to us: On insecure wpa2-enterprise configurations
MH Hue, J Debnath, KM Leung, L Li, M Minaei, MH Mazhar, K Xian, ...
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
62021
MAVERICK: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime
MH Mazhar, L Li, E Hoque, O Chowdhury
arXiv preprint arXiv:2302.01452, 2023
32023
Morpheus: Bringing The (PKCS) One To Meet the Oracle
M Yahyazadeh, SY Chau, L Li, MH Hue, J Debnath, SC Ip, CN Li, ...
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–5