From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Don't Shoot the Messenger: Localization Prevention of Satellite Internet Users., , , и . CoRR, (2023)One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices., , , , , и . CoRR, (2024)Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants., , и . AsiaCCS, стр. 465-478. ACM, (2019)FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants., , , , , и . CCS, стр. 1861-1883. ACM, (2021)WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens., , , , , , и . SP, стр. 984-1001. IEEE, (2022)LeakyPick: IoT Audio Spy Detector., , , , и . ACSAC, стр. 694-705. ACM, (2020)Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M., , и . USENIX Security Symposium, стр. 6239-6256. USENIX Association, (2023)Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats., , , и . ACSAC, стр. 190-204. ACM, (2023)GhostTouch: Targeted Attacks on Touchscreens without Physical Touch., , , , , и . USENIX Security Symposium, стр. 1543-1559. USENIX Association, (2022)