C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Weijia He
ORCID
Publication Activity (10 Years)
Years Active: 2016-2024
Publications (10 Years): 10
Top Topics
Role Based Access Control Model
Ubiquitous Computing
Smart Devices
Ambient Intelligence
Top Venues
EuroS&P
USENIX Security Symposium
IEEE Symposium on Security and Privacy Workshops
HotMobile
</>
Publications
</>
Chixiang Wang
,
Liam Cassidy
,
Weijia He
,
Timothy J. Pierson
,
David Kotz
Challenges and opportunities in onboarding smart-home devices.
HotMobile
(2024)
Denise L. Anthony
,
Carl A. Gunter
,
Weijia He
,
Mounib Khanafer
,
Susan Landau
,
Ravindra Mangar
,
Nathan Reitinger
The HandyTech's Coming Between 1 and 4: Privacy Opportunities and Challenges for the IoT Handyperson.
WPES@CCS
(2023)
Weijia He
,
Valerie Zhao
,
Olivia Morkved
,
Sabeeka Siddiqui
,
Earlence Fernandes
,
Josiah Hester
,
Blase Ur
SoK: Context Sensing for Access Control in the Adversarial Home IoT.
EuroS&P
(2021)
Weijia He
,
Ming-Lin Yang
,
Wu Wang
,
Xin-Qing Sheng
Efficient parallelization of multilevel fast multipole algorithm for electromagnetic simulation on many-core SW26010 processor.
J. Supercomput.
77 (2) (2021)
Lefan Zhang
,
Weijia He
,
Olivia Morkved
,
Valerie Zhao
,
Michael L. Littman
,
Shan Lu
,
Blase Ur
Trace2TAP: Synthesizing Trigger-Action Programs from Traces of Behavior.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
4 (3) (2020)
Lefan Zhang
,
Weijia He
,
Jesse Martinez
,
Noah Brackenbury
,
Shan Lu
,
Blase Ur
AutoTap: synthesizing and repairing trigger-action programs using LTL properties.
ICSE
(2019)
Will Brackenbury
,
Abhimanyu Deora
,
Jillian Ritchey
,
Jason Vallee
,
Weijia He
,
Guan Wang
,
Michael L. Littman
,
Blase Ur
How Users Interpret Bugs in Trigger-Action Programming.
CHI
(2019)
Weijia He
,
Jesse Martinez
,
Roshni Padhi
,
Lefan Zhang
,
Blase Ur
When Smart Devices Are Stupid: Negative Experiences Using Home Smart Devices.
IEEE Symposium on Security and Privacy Workshops
(2019)
Weijia He
,
Maximilian Golla
,
Roshni Padhi
,
Jordan Ofek
,
Markus Dürmuth
,
Earlence Fernandes
,
Blase Ur
Rethinking Access Control and Authentication for the Home Internet of Things (IoT).
USENIX Security Symposium
(2018)
Zihao Wang
,
Futai Zou
,
Bei Pei
,
Weijia He
,
Li Pan
,
Zhaochong Mao
,
Linsen Li
Detecting Malicious Server Based on Server-to-Server Realation Graph.
DSC
(2016)