Author of the publication

Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks.

, , , , , , and . USENIX Security Symposium, page 2455-2472. USENIX Association, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy Chance-Constrained Programming for Capital Budgeting Problem with Fuzzy Decisions., , and . FSKD (1), volume 3613 of Lecture Notes in Computer Science, page 304-311. Springer, (2005)Privacy-Aware High-Quality Map Generation with Participatory Sensing., , , , , and . IEEE Trans. Mob. Comput., 15 (3): 719-732 (2016)New models of supply chain network design by different decision criteria under hybrid uncertainties., , and . J. Ambient Intell. Humaniz. Comput., 10 (7): 2843-2853 (2019)MagDefender: Detecting Eavesdropping on Mobile Devices using the Built-in Magnetometer., , , , , , and . SECON, page 28-36. IEEE, (2022)TPatch: A Triggered Physical Adversarial Patch., , , , and . USENIX Security Symposium, page 661-678. USENIX Association, (2023)The Silent Manipulator: A Practical and Inaudible Backdoor Attack against Speech Recognition Systems., , , , and . ACM Multimedia, page 7849-7858. ACM, (2023)Fuzzy multi-product constraint newsboy problem., and . Appl. Math. Comput., 180 (1): 7-15 (2006)Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound., , , , , and . CoRR, (2023)Exploring Adversarial Robustness of LiDAR-Camera Fusion Model in Autonomous Driving., , , , and . CoRR, (2023)A currency exchange rate model with jumps in uncertain environment., and . Soft Comput., 21 (18): 5507-5514 (2017)