If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the expert's scholarly documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 3 Similar Profiles
Access control Engineering & Materials Science
Semantics Engineering & Materials Science
Active networks Engineering & Materials Science
Network protocols Engineering & Materials Science
Specifications Engineering & Materials Science
Servers Engineering & Materials Science
Monitoring Engineering & Materials Science
Cryptography Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1985 2019

Beeer: Distributed record and replay for medical devices in hospital operating rooms

Hojjati, A., Demetriou, S., Long, Y. & Gunter, C., Apr 1 2019, Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019. Association for Computing Machinery, a1. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Operating rooms
Safety devices
Synchronization
Communication

Charting the atack surface of trigger-action IoT platforms

Wang, Q., Datta, P., Yang, W., Liu, S., Bates, A. & Gunter, C. A., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1439-1453 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Model checking
Internet of things
Ecosystems
Large scale systems
Processing

CommanderSong: A systematic approach for practical adversarial voice recognition

Yuan, X., Chen, Y., Zhao, Y., Long, Y., Liu, X., Chen, K., Zhang, S., Huang, H., Wang, X. F. & Gunter, C. A., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 49-64 16 p. (Proceedings of the 27th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Speech recognition
Transducers
Ultrasonics
Internet
Air

De facto diagnosis specialties: Recognition and discovery

Zhang, A., Lu, X., Gunter, C. A., Yao, S., Tao, F., Zhu, R., Gui, H., Fabbri, D., Liebovitz, D. & Malin, B., Jan 1 2018, In : Learning Health Systems. 2, 3, e10057.

Research output: Contribution to journalArticle

Open Access
Health Personnel
Learning
Medicine
Information Services
Recognition (Psychology)

Evaluating Detectors on Optimal Attack Vectors That Enable Electricity Theft and der Fraud

Krishna, V. B., Gunter, C. & Sanders, W. H., Aug 2018, In : IEEE Journal on Selected Topics in Signal Processing. 12, 4, p. 790-805 16 p., 8355252.

Research output: Contribution to journalArticle

Electricity
Detectors
Energy resources
Advanced metering infrastructures
Smart meters