Cited By
View all- Baskaran SZhao LMannan MYoussef A(2023)Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat CaseProceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3607199.3607236(727-743)Online publication date: 16-Oct-2023
- Liu XZhang JSu BShang ZZhao JDong Z(2023)API Behavior Anomaly Detection Method Based on Deep Learning and Adaptive Clustering2023 5th International Conference on Frontiers Technology of Information and Computer (ICFTIC)10.1109/ICFTIC59930.2023.10456177(926-931)Online publication date: 17-Nov-2023
- Kim D(2022)Cyberbullying Behaviors in Online Travel Community: Members’ Perceptions and Sustainability in Online CommunitySustainability10.3390/su1409522014:9(5220)Online publication date: 26-Apr-2022
- Show More Cited By