From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Toward Pitch-Insensitive Speaker Verification via Soundfield., , , , , и . IEEE Internet Things J., 11 (1): 1175-1189 (января 2024)Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks., , , , , , и . USENIX Security Symposium, стр. 2455-2472. USENIX Association, (2023)Authenticating Smart Home Devices via Home Limited Channels., , , , , и . ACM Trans. Internet Things, 1 (4): 24:1-24:24 (2020)SenCS: Enabling Real-time Indoor Proximity Verification via Contextual Similarity., , , , и . ACM Trans. Sens. Networks, 17 (2): 19:1-19:22 (2021)Volttack: Control IoT Devices by Manipulating Power Supply Voltage., , , , , и . SP, стр. 1771-1788. IEEE, (2023)Anti-Replay: A Fast and Lightweight Voice Replay Attack Detection System., , , , , и . ICPADS, стр. 169-176. IEEE, (2021)HlcAuth: Key-free and Secure Communications via Home-Limited Channel., , , , , , и . AsiaCCS, стр. 29-35. ACM, (2018)Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification., , , , и . IEEE Trans. Inf. Forensics Secur., (2024)DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation., , , , , и . SP, стр. 3113-3128. IEEE, (2023)