Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Speech Re-use Prevention in Voice-driven Services., , , , and . RAID, page 282-295. ACM, (2021)Utilizing an NG 9-1-1 Test Lab to Validate Standards Compliance., , and . IEEE Communications Magazine, 55 (1): 146-151 (2017)Code-aided interference suppression for communication system with MSK modulation., , , , , and . ISSPIT, page 274-279. IEEE, (2016)Smoothing Beamformer for MIMO-FBMC Based on Frequency Spreading., , , , , and . ComComAP, page 23-28. IEEE, (2019)Do Users Really Know Alexa? Understanding Alexa Skill Security Indicators., , , and . AsiaCCS, page 870-883. ACM, (2023)Missing value imputation via copula and transformation methods, with applications to financial and economic data., , , and . IJDATS, 4 (4): 315-339 (2012)Novel Nonlinearity Based on Gaussianization and Generalized Matching for Impulsive Noise Suppression., and . IEEE Access, (2019)Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications., , , , , and . NDSS, The Internet Society, (2019)SG-SRNs: Superpixel-Guided Scene Representation Networks., , , , and . IEEE Signal Process. Lett., (2022)#DM-Me: Susceptibility to Direct Messaging-Based Scams., , , , and . AsiaCCS, page 494-508. ACM, (2023)