مقالات بحثية تمّ التفويض بإتاحتها للجميع - Hang Huمزيد من المعلومات
عدد المقالات البحثية المتاحة للجميع في موقع ما: 11
Needle in a haystack: Tracking down elite phishing domains in the wild
K Tian, STK Jan, H Hu, D Yao, G Wang
Proceedings of the Internet Measurement Conference 2018, 429-442, 2018
التفويضات: US National Science Foundation
Understanding the reproducibility of crowd-reported security vulnerabilities
D Mu, A Cuevas, L Yang, H Hu, X Xing, B Mao, G Wang
27th USENIX Security Symposium (USENIX Security 18), 919-936, 2018
التفويضات: US National Science Foundation, National Natural Science Foundation of China
{End-to-End} measurements of email spoofing attacks
H Hu, G Wang
27th USENIX Security Symposium (USENIX Security 18), 1095-1112, 2018
التفويضات: US National Science Foundation
The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services
C Wang, STK Jan, H Hu, D Bossart, G Wang
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
التفويضات: US National Science Foundation
What happens after you leak your password: Understanding credential sharing on phishing sites
P Peng, C Xu, L Quinn, H Hu, B Viswanath, G Wang
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
التفويضات: US National Science Foundation
Towards understanding the adoption of anti-spoofing protocols in email systems
H Hu, P Peng, G Wang
2018 IEEE Cybersecurity Development (SecDev), 94-101, 2018
التفويضات: US National Science Foundation
Read between the lines: An empirical measurement of sensitive applications of voice personal assistant systems
FH Shezan, H Hu, J Wang, G Wang, Y Tian
Proceedings of the Web Conference 2020, 1006-1017, 2020
التفويضات: US National Science Foundation
Assessing browser-level defense against {IDN-based} phishing
H Hu, STK Jan, Y Wang, G Wang
30th USENIX Security Symposium (USENIX Security 21), 3739-3756, 2021
التفويضات: US National Science Foundation
Verhealth: Vetting medical voice applications through policy enforcement
FH Shezan, H Hu, G Wang, Y Tian
Proceedings of the ACM on interactive, mobile, wearable and ubiquitous …, 2020
التفويضات: US National Science Foundation
Characterizing pixel tracking through the lens of disposable email services
H Hu, P Peng, G Wang
2019 IEEE Symposium on Security and Privacy (SP), 365-379, 2019
التفويضات: US National Science Foundation
A case study of the security vetting process of smart-home assistant applications
H Hu, L Yang, S Lin, G Wang
2020 IEEE Security and Privacy Workshops (SPW), 76-81, 2020
التفويضات: US National Science Foundation
يتم تحديد معلومات التمويل والنشر من خلال برنامج كمبيوتر تلقائيًا.