Author of the publication

Assessing Browser-level Defense against IDN-based Phishing.

, , , and . USENIX Security Symposium, page 3739-3756. USENIX Association, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

基于BP神经网络的协作频谱感知技术 (Cooperative Spectrum Sensing Technology Based on BP Neural Network)., , and . 计算机科学, 42 (2): 43-45 (2015)Efficient design optimisation for UAV-enabled mobile edge computing in cognitive radio networks., , , , , and . IET Commun., 14 (15): 2509-2515 (2020)On the Spectrum- and Energy-Efficiency Tradeoff in Cognitive Radio Networks., , and . IEEE Trans. Commun., 64 (2): 490-501 (2016)Optimization of Energy Management for UAV-Enabled Cognitive Radio., , , , , and . IEEE Wirel. Commun. Lett., 9 (9): 1505-1508 (2020)Characterizing Pixel Tracking through the Lens of Disposable Email Services., , and . IEEE Symposium on Security and Privacy, page 365-379. IEEE, (2019)A Third-order Band-pass Fully-passive Noise-Shaping Modulator Based on a Time-interleaved SAR ADC., , , , and . MWSCAS, page 101-104. IEEE, (2018)A 0.87 mW 7MHz-BW 76dB-SNDR passive noise-shaping modulator based on a SAR ADC., , , , and . ASICON, page 28-31. IEEE, (2017)Power and Time Slot Allocation Method for Secured Satellite Transmission Based on Weighted Fractional Data Carrying Artificial Noise., , , , and . IEEE Access, (2018)Fast Computing von Neumann Entropy for Large-scale Graphs via Quadratic Approximations., , , and . CoRR, (2018)VerHealth: Vetting Medical Voice Applications through Policy Enforcement., , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 4 (4): 153:1-153:21 (2020)