Old Web
English
Sign In
Acemap
>
authorDetail
>
Yuhong Nan
Yuhong Nan
Purdue University
Computer science
Bluetooth Low Energy
Spoofing attack
Computer network
One-time password
6
Papers
15
Citations
0.00
KQI
Citation Trend
Filter By
Interval:
1900~2024
1900
2024
Author
Papers (4)
Sort By
Default
Most Recent
Most Early
Most Citation
No data
Journal
Conference
Others
Understanding Malicious Cross-library Data Harvesting on Android
2021
SECURITY | USENIX Security Symposium
Jice Wang
Yue Xiao
Xueqiang Wang
Yuhong Nan
Luyi Xing
Xiaojing Liao
JinWei Dong
Nicolas Serrano
Haoran Lu
XiaoFeng Wang
Yuqing Zhang
Show All
Source
Cite
Save
Citations (0)
Understanding Malicious Cross-library Data Harvesting on Android
2021
SECURITY | USENIX Security Symposium
Jice Wang
Yue Xiao
Xueqiang Wang
Yuhong Nan
Luyi Xing
Xiaojing Liao
JinWei Dong
Nicolas Serrano
Haoran Lu
XiaoFeng Wang
Yuqing Zhang
Show All
Source
Cite
Save
Citations (0)
{ATLAS}: A Sequence-based Learning Approach for Attack Investigation
2021
SECURITY | USENIX Security Symposium
Abdulellah Alsaheel
Yuhong Nan
Shiqing Ma
Le Yu
Gregory Walkup
Z. Berkay Celik
Xiangyu Zhang
Dongyan Xu
Show All
Source
Cite
Save
Citations (2)
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy.
2020
SECURITY | USENIX Security Symposium
Jianliang Wu
Yuhong Nan
Vireshwar Kumar
Dave (Jing) Tian
Antonio Bianchi
Mathias Payer
Dongyan Xu
Show All
Source
Cite
Save
Citations (10)
1