Weijia He
Weijia He
Verified email at uchicago.edu - Homepage
Cited by
Cited by
Rethinking access control and authentication for the home internet of things (IoT)
W He, M Golla, R Padhi, J Ofek, M Dürmuth, E Fernandes, B Ur
27th {USENIX} Security Symposium ({USENIX} Security 18), 255-272, 2018
AutoTap: synthesizing and repairing trigger-action programs using LTL properties
L Zhang, W He, J Martinez, N Brackenbury, S Lu, B Ur
2019 IEEE/ACM 41st international conference on software engineering (ICSE …, 2019
How users interpret bugs in trigger-action programming
W Brackenbury, A Deora, J Ritchey, J Vallee, W He, G Wang, ML Littman, ...
Proceedings of the 2019 CHI conference on human factors in computing systems …, 2019
When smart devices are stupid: negative experiences using home smart devices
W He, J Martinez, R Padhi, L Zhang, B Ur
2019 IEEE Security and Privacy Workshops (SPW), 150-155, 2019
Trace2TAP: Synthesizing Trigger-Action Programs from Traces of Behavior
L Zhang, W He, O Morkved, V Zhao, ML Littman, S Lu, B Ur
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020
Our Editorial Leadership
J Zhang, T Chen, S Zhong, J Wang, W Zhang, X Zuo, RG Maunder, ...
Proceedings of the IEEE, 2019
Clap on, clap off: Usability of authentication methods in the smart home
W He, J Hainline, R Padhi, B Ur
Proceedings of the Interactive Workshop on the Human Aspect of Smarthome …, 2018
SoK: Context Sensing for Access Control in the Adversarial Home IoT
W He, V Zhao, O Morkved, S Siddiqui, E Fernandes, J Hester, B Ur
The system can't perform the operation now. Try again later.
Articles 1–8