Author of the publication

GhostTouch: Targeted Attacks on Touchscreens without Physical Touch.

, , , , , and . USENIX Security Symposium, page 1543-1559. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks., , , , , , and . USENIX Security Symposium, page 2455-2472. USENIX Association, (2023)V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization., , , , , and . USENIX Security Symposium, page 5181-5198. USENIX Association, (2023)Which One to Go: Security and Usability Evaluation of Mid-Air Gestures., , , , , , and . CoRR, (2018)Lightweight secure communication protocols for in-vehicle sensor networks., , , and . CyCAR@CCS, page 19-30. ACM, (2013)A Nonlinearity-Based Secure Face-to-Face Device Authentication for Mobile Devices., , , , and . IEEE Trans. Mob. Comput., 21 (4): 1155-1171 (2022)Validating the Contextual Information of Outdoor Images for Photo Misuse Detection., , , , , and . CoRR, (2018)Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Regional Patterns and Vulnerability Analysis of Chinese Web Passwords., , , and . IEEE Trans. Inf. Forensics Secur., 11 (2): 258-272 (2016)DepthFake: Spoofing 3D Face Authentication with a 2D Photo., , , , and . SP, page 917-91373. IEEE, (2023)WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens., , , , , , and . SP, page 984-1001. IEEE, (2022)