Cited By
View all- Eryonucu CPapadimitratos PJadliwala MKim YDmitrienko A(2022)Sybil-Based Attacks on Google Maps or How to Forge the Image of City LifeProceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3507657.3528538(73-84)Online publication date: 16-May-2022
- Khan SWoszczyk DYou CDemetriou SNaveed M(2021)Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing ServicesProceedings of the 37th Annual Computer Security Applications Conference10.1145/3485832.3485888(944-956)Online publication date: 6-Dec-2021
- Zhao QZheng NBao Q(2020)Location Spoofing Detection for Social Network Service using Camera FingerprintProceedings of the 2020 4th International Conference on Vision, Image and Signal Processing10.1145/3448823.3448843(1-6)Online publication date: 9-Dec-2020
- Show More Cited By