Ceive: Combating caller id spoofing on 4g mobile phones via callee-only inference and verification H Deng, W Wang, C Peng Proceedings of the 24th Annual International Conference on Mobile Computing …, 2018 | 25 | 2018 |
Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy W Wang, F Cicala, SR Hussain, E Bertino, N Li Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020 | 12 | 2020 |
Pure: A framework for analyzing proximity-based contact tracing protocols F Cicala, W Wang, T Wang, N Li, E Bertino, F Liang, Y Yang ACM Computing Surveys (CSUR) 55 (1), 1-36, 2021 | 11 | 2021 |
Towards Efficient Privacy-Preserving Deep Packet Inspection W Wang, H Lee, Y Huang, E Bertino, N Li European Symposium on Research in Computer Security, 166-192, 2023 | 3 | 2023 |
Analyzing and Improving Security-Enhanced Communication Protocols W Wang Purdue University Graduate School, 2023 | | 2023 |