Author of the publication

Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks.

, , , , , , , , , , and . USENIX Security Symposium, page 3201-3217. USENIX Association, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Privacy and Security of the Ultrasound Ecosystem., , , , , and . Proc. Priv. Enhancing Technol., 2017 (2): 95-112 (2017)Semantic stereo visual SLAM toward outdoor dynamic environments based on ORB-SLAM2., , , , and . Ind. Robot, 50 (3): 542-554 (2023)Common Postzygotic Mutational Signatures in Healthy Adult Tissues Related to Embryonic Hypoxia., , , , , , , , , and 15 other author(s). Genom. Proteom. Bioinform., 20 (1): 177-191 (2022)Development of a Lightweight Underwater Manipulator for Delicate Structural Repair Operations., , , , and . IEEE Robotics Autom. Lett., 8 (10): 6563-6570 (October 2023)SmartIndex: An Index Advisor with Learned Cost Estimator., , , and . CIKM, page 4853-4856. ACM, (2022)DIFUZE: Interface Aware Fuzzing for Kernel Drivers., , , , , , and . CCS, page 2123-2138. ACM, (2017)A Model-Agnostic Approach for Learning with Noisy Labels of Arbitrary Distributions., , , and . ICDE, page 1219-1231. IEEE, (2022)Sensor Networks Routing via Bayesian Exploration., and . LCN, page 954-955. IEEE Computer Society, (2006)An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come?, , , , , , , , , and . Internet Measurement Conference, page 22-35. ACM, (2019)A Reexamination of Internationalized Domain Names: The Good, the Bad and the Ugly., , , , , , and . DSN, page 654-665. IEEE Computer Society, (2018)