Author of the publication

Assessing Browser-level Defense against IDN-based Phishing.

, , , and . USENIX Security Symposium, page 3739-3756. USENIX Association, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services., , , , and . CODASPY, page 196-203. ACM, (2018)Empirical Analysis of Password Reuse and Modification across Online Service., , , and . CoRR, (2017)Throwing Darts in the Dark? Detecting Bots with Limited Data using Neural Data Augmentation., , , , , , and . SP, page 1190-1206. IEEE, (2020)Mining Unstable Communities from Network Ensembles., , , , and . ICDM Workshops, page 508-515. IEEE Computer Society, (2015)Assessing Browser-level Defense against IDN-based Phishing., , , and . USENIX Security Symposium, page 3739-3756. USENIX Association, (2021)Analyzing Payment-Driven Targeted Q8A Systems., , , and . ACM Trans. Soc. Comput., 1 (3): 12:1-12:21 (2018)It's Not What It Looks Like: Manipulating Perceptual Hashing based Applications., , , and . CCS, page 69-85. ACM, (2021)Connecting the Digital and Physical World: Improving the Robustness of Adversarial Attacks., , , , and . AAAI, page 962-969. AAAI Press, (2019)Unstable Communities in Network Ensembles., , , , and . SDM, page 504-512. SIAM, (2016)Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media., , , , , and . CIKM, page 1049-1057. ACM, (2017)