Opening the blackbox of virustotal: Analyzing online phishing scan engines P Peng, L Yang, L Song, G Wang Proceedings of the Internet Measurement Conference, 478-485, 2019 | 123 | 2019 |
What happens after you leak your password: Understanding credential sharing on phishing sites P Peng, C Xu, L Quinn, H Hu, B Viswanath, G Wang Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019 | 52 | 2019 |
You are your photographs: Detecting multiple identities of vendors in the darknet marketplaces X Wang, P Peng, C Wang, G Wang Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 37 | 2018 |
Towards understanding the adoption of anti-spoofing protocols in email systems H Hu, P Peng, G Wang 2018 IEEE Cybersecurity Development (SecDev), 94-101, 2018 | 34 | 2018 |
Characterizing pixel tracking through the lens of disposable email services H Hu, P Peng, G Wang 2019 IEEE Symposium on Security and Privacy (SP), 365-379, 2019 | 27 | 2019 |
Towards the adoption of anti-spoofing protocols H Hu, P Peng, G Wang arXiv preprint arXiv:1711.06654, 2017 | 3 | 2017 |
A Measurement Approach to Understanding the Data Flow of Phishing from Attacker and Defender Perspectives P Peng Virginia Tech, 2020 | | 2020 |
What Happens After You Leak Your Password P Peng, C Xu, L Quinn, H Hu, B Viswanath, G Wang Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | | 2019 |
Towards the Adoption of Anti-spoofing Protocols for Email Systems. H Hu, P Peng, G Wang arXiv preprint arXiv:1711.06654, 2017 | | 2017 |