Poster: Reavatar: Virtual reality de-anonymization attack through correlating movement signatures B Falk, Y Meng, Y Zhan, H Zhu Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 15 | 2021 |
De-anonymization attacks on metaverse Y Meng, Y Zhan, J Li, S Du, H Zhu, XS Shen IEEE INFOCOM 2023-IEEE Conference on Computer Communications, 1-10, 2023 | 7 | 2023 |
Vetting privacy policies in VR: a data minimization principle perspective Y Zhan, Y Meng, L Zhou, H Zhu IEEE INFOCOM 2023-IEEE Conference on Computer Communications Workshops …, 2023 | 3 | 2023 |
De-Anonymizing Avatars in Virtual Reality: Attacks and Countermeasures Y Meng, Y Zhan, J Li, S Du, H Zhu, X Shen IEEE Transactions on Mobile Computing, 2024 | 2 | 2024 |
Dangers behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables J Li, Y Meng, Y Zhan, L Zhang, H Zhu IEEE Transactions on Information Forensics and Security, 2024 | 1 | 2024 |
VPVet: Vetting Privacy Policies of Virtual Reality Apps Y Zhan, Y Meng, L Zhou, Y Xiong, X Zhang, L Ma, G Chen, Q Pei, H Zhu Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024 | | 2024 |