Cited By
View all- Suchaiya SRuanmanee SPachanatip NNiramitranon JJaikaeo C(2024)Integration Model for Face Registration Checkpoint2024 21st International Joint Conference on Computer Science and Software Engineering (JCSSE)10.1109/JCSSE61278.2024.10613670(432-439)Online publication date: 19-Jun-2024
- Lim KKwon YKim DMontpetit MLeivadeas AUhlig SJaved M(2023)A Longitudinal Study of Vulnerable Client-side Resources and Web Developers' Updating BehaviorsProceedings of the 2023 ACM on Internet Measurement Conference10.1145/3618257.3624804(162-180)Online publication date: 24-Oct-2023
- Zhang ZZhang ZLian KYang GZhang LZhang YYang MLin ZLiao X(2023)TrustedDomain Compromise Attack in App-in-app EcosystemsProceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps10.1145/3605762.3624430(51-57)Online publication date: 26-Nov-2023
- Show More Cited By