Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Speech Re-use Prevention in Voice-driven Services., , , , and . RAID, page 282-295. ACM, (2021)Code-aided interference suppression for communication system with MSK modulation., , , , , and . ISSPIT, page 274-279. IEEE, (2016)Smoothing Beamformer for MIMO-FBMC Based on Frequency Spreading., , , , , and . ComComAP, page 23-28. IEEE, (2019)Utilizing an NG 9-1-1 Test Lab to Validate Standards Compliance., , and . IEEE Communications Magazine, 55 (1): 146-151 (2017)Do Users Really Know Alexa? Understanding Alexa Skill Security Indicators., , , and . AsiaCCS, page 870-883. ACM, (2023)Missing value imputation via copula and transformation methods, with applications to financial and economic data., , , and . IJDATS, 4 (4): 315-339 (2012)Novel Nonlinearity Based on Gaussianization and Generalized Matching for Impulsive Noise Suppression., and . IEEE Access, (2019)Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications., , , , , and . NDSS, The Internet Society, (2019)The Service Worker Hiding in Your Browser: The Next Web Attack Target?, , , , and . RAID, page 312-323. ACM, (2021)Automatic Synthesis of Network Security Services: A First Step., , , and . ICCCN, page 1-10. IEEE, (2023)