Zipf’s law in passwords D Wang, H Cheng, P Wang, X Huang, G Jian IEEE Transactions on Information Forensics and Security 12 (11), 2776-2791, 2017 | 510 | 2017 |
On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices D Wang, H Cheng, D He, P Wang IEEE Systems Journal 12 (1), 916-925, 2016 | 127 | 2016 |
The request for better measurement: A comparative evaluation of two-factor authentication schemes D Wang, Q Gu, H Cheng, P Wang Proceedings of the 11th ACM on Asia conference on computer and …, 2016 | 110 | 2016 |
fuzzyPSM: A new password strength meter using fuzzy probabilistic context-free grammars D Wang, D He, H Cheng, P Wang 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 104 | 2016 |
Practical threshold multi-factor authentication W Li, H Cheng, P Wang, K Liang IEEE transactions on information forensics and security 16, 3573-3588, 2021 | 24 | 2021 |
Understanding passwords of Chinese users: Characteristics, security and implications D Wang, H Cheng, Q Gu, P Wang CACR Report, presented at ChinaCrypt, 2015 | 23 | 2015 |
An Alternative Method for Understanding User‐Chosen Passwords Z Zheng, H Cheng, Z Zhang, Y Zhao, P Wang Security and Communication Networks 2018 (1), 6160125, 2018 | 19 | 2018 |
Probability Model Transforming Encoders Against Encoding Attacks H Cheng, Z Zheng, W Li, P Wang, CH Chu 28th USENIX Security Symposium (USENIX Security 19), 1573--1590, 2019 | 14 | 2019 |
Incrementally updateable honey password vaults H Cheng, W Li, P Wang, CH Chu, K Liang 30th USENIX Security Symposium (USENIX Security 21), 857-874, 2021 | 12 | 2021 |
Passtrans: An improved password reuse model based on transformer X He, H Cheng, J Xie, P Wang, K Liang ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and …, 2022 | 8 | 2022 |
Improved probabilistic context-free grammars for passwords using word extraction H Cheng, W Li, P Wang, K Liang ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021 | 7 | 2021 |
WordMarkov: A New Password Probability Model of Semantics J Xie, H Cheng, R Zhu, P Wang, K Liang ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and …, 2022 | 4 | 2022 |
Secure chaotic maps-based authentication scheme for real-time data access In Internet of Things W Li, H Cheng, P Wang 2019 International Conference on Cyber Security and Protection of Digital …, 2019 | 3 | 2019 |
An Improved GAN-based Depth Estimation Network for Face Anti-Spoofing Z Zhang, H Cheng, W Li, P Wang Proceedings of the 2023 9th International Conference on Computing and …, 2023 | 2 | 2023 |
Understanding passwords of chinese users: A survey and empirical analysis D Wang, H Cheng, P Wang, X Huang, C Chu CACR Report, Presented at ChinaCrypt, 2015 | 1 | 2015 |
Reveal the Mathematical Structures of Honeyword Security Metrics P Su, H Cheng, W Li, P Wang arXiv preprint arXiv:2311.10960, 2023 | | 2023 |
Improved Wordpcfg for Passwords with Maximum Probability Segmentation W Li, J Yang, H Cheng, P Wang, K Liang ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023 | | 2023 |
Understanding Passwords of Chinese Users: A Data-Driven Approach D Wang, H Cheng, P Wang | | |