Author of the publication

DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation.

, , , , , and . SP, page 3113-3128. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authenticating Smart Home Devices via Home Limited Channels., , , , , and . ACM Trans. Internet Things, 1 (4): 24:1-24:24 (2020)On Detecting Hidden Wireless Cameras: A Traffic Pattern-based Approach., , , and . IEEE Trans. Mob. Comput., 19 (4): 907-921 (2020)MagView++: Data Exfiltration via CPU Magnetic Signals Under Video Decoding., , , , , and . IEEE Trans. Mob. Comput., 23 (3): 2486-2503 (March 2024)Models and algorithm for stochastic shortest path problem.. Appl. Math. Comput., 170 (1): 503-514 (2005)A Fuzzy Programming Approach for Supply Chain Network Design., , and . Int. J. Uncertain. Fuzziness Knowl. Based Syst., 15 (Supplement-2): 75-87 (2007)Dr. Defender: Proactive Detection of Autopilot Drones Based on CSI., , , , and . IEEE Trans. Inf. Forensics Secur., (2024)OPCIO: Optimizing Power Consumption for Embedded Devices via GPIO Configuration., , , , and . ACM Trans. Sens. Networks, 16 (2): 16:1-16:28 (2020)LESS: Link Estimation with Sparse Sampling in Intertidal WSNs., , , , and . Sensors, 18 (3): 747 (2018)Pido: Predictive Delay Optimization for Intertidal Wireless Sensor Networks., , , , , , , and . Sensors, 18 (5): 1464 (2018)DolphinAtack: Inaudible Voice Commands., , , , , and . CoRR, (2017)