Login / Signup
Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case.
Supraja Baskaran
Lianying Zhao
Mohammad Mannan
Amr M. Youssef
Published in:
CoRR (2023)
Keyphrases
</>
data mining
neural network
biometric authentication
decision trees
security mechanisms