Cited By
View all- Dhondt KLe Pochat VDimova YJoosen WVolckaert SBalzarotti DXu W(2024)Swipe left for identity theftProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699183(5053-5070)Online publication date: 14-Aug-2024
- Yang HXia ZShin JHua JMao YZhong S(2024)A Comprehensive Study of Trajectory Forgery and Detection in Location-Based ServicesIEEE Transactions on Mobile Computing10.1109/TMC.2023.327341123:4(3228-3242)Online publication date: Apr-2024
- Eryonucu CPapadimitratos PJadliwala MKim YDmitrienko A(2022)Sybil-Based Attacks on Google Maps or How to Forge the Image of City LifeProceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3507657.3528538(73-84)Online publication date: 16-May-2022
- Show More Cited By