Follow
Huan Feng
Huan Feng
Facebook
Verified email at umich.edu
Title
Cited by
Cited by
Year
Bohatei: Flexible and elastic {DDoS} defense
SK Fayaz, Y Tobioka, V Sekar, M Bailey
24th USENIX security symposium (USENIX Security 15), 817-832, 2015
454*2015
Continuous authentication for voice assistants
H Feng, K Fawaz, KG Shin
Proceedings of the 23rd Annual International Conference on Mobile Computing …, 2017
3302017
Understanding and defending the binder attack surface in android
H Feng, KG Shin
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
192016
{LinkDroid}: Reducing Unregulated Aggregation of App Usage Behaviors
H Feng, K Fawaz, KG Shin
24th USENIX Security Symposium (USENIX Security 15), 769-783, 2015
182015
BinderCracker: Assessing the robustness of android system services
H Feng, KG Shin
arXiv preprint arXiv:1604.06964, 2016
122016
POSTER: Positioning attack on proximity-based people discovery
H Feng, KG Shin
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
32014
Wearable technology brings security to Alexa and Siri
H Feng, K Fawaz, KG Shin
GetMobile: Mobile Computing and Communications 22 (1), 35-38, 2018
22018
Regulating and Securing the Interfaces Across Mobile Apps, OS and Users
H Feng
12017
Masquerade of mobile applications: Introducing unlinkability in a practical way
H Feng, KG Shin
2016 14th Annual Conference on Privacy, Security and Trust (PST), 54-61, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–9