Cited By
View all- Jiang CYang JLi XLi QZhang XRen JLuo BLiao XXu JKirda ELie D(2024)RISiren: Wireless Sensing System Attacks via MetasurfaceProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690186(3332-3345)Online publication date: 2-Dec-2024
- Zhou XDeng QPu JMan KQian ZKrishnamurthy SLuo BLiao XXu JKirda ELie D(2024)Untangling the Knot: Breaking Access Control in Home Wireless Mesh NetworksProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670380(2072-2086)Online publication date: 2-Dec-2024
- Xu MHe YLi XHu JChen ZXiao FLuo JGanesan DLane NShi W(2024)Beamforming made Malicious: Manipulating Wi-Fi Traffic via Beamforming Feedback ForgeryProceedings of the 30th Annual International Conference on Mobile Computing and Networking10.1145/3636534.3690669(908-922)Online publication date: 4-Dec-2024
- Show More Cited By