Cited By
View all- Hu JWang HZheng THu JChen ZJiang HLuo JMeng WJensen CCremers CKirda E(2023)Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke EavesdroppingProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623088(239-252)Online publication date: 15-Nov-2023
- Fúster JSolera-Cotanilla SPérez JVega-Barbas MPalacios RÁlvarez-Campana MLopez G(2023)Analysis of security and privacy issues in wearables for minorsWireless Networks10.1007/s11276-022-03211-630:6(5437-5453)Online publication date: 8-Mar-2023
- Lin YGao YLi BDong W(2022)Detecting Rogue Access Points Using Client-agnostic Wireless FingerprintsACM Transactions on Sensor Networks10.1145/353642319:1(1-25)Online publication date: 8-Dec-2022
- Show More Cited By