Cited By
View all- Li SYang ZYang GZhang HHua NHuang YYang MCalandrino JTroncoso C(2023)Notice the imposter! a study on user tag spoofing attack in mobile appsProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620544(5485-5501)Online publication date: 9-Aug-2023
- Cui ZCui BFu JBhargava B(2023)An Attack to One-Tap Authentication Services in Cellular NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.330484018(5082-5095)Online publication date: 2023
- Hao QLuo LJan SWang GKim YKim JVigna GShi E(2021)It's Not What It Looks Like: Manipulating Perceptual Hashing based ApplicationsProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3484559(69-85)Online publication date: 12-Nov-2021
- Show More Cited By