Author of the publication

Deep Learning Enabled Keystroke Eavesdropping Attack Over Videoconferencing Platforms.

, , and . INFOCOM Workshops, page 1-2. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities., , , , , and . IEEE Access, (2020)Blockchain-Based Digital Forensics Investigation Framework in the Internet of Things and Social Systems., , and . IEEE Trans. Comput. Soc. Syst., 6 (6): 1433-1441 (2019)Lightweight Encryption Algorithm Containing SPN Structure for IoT., , , , and . CSS (2), volume 11983 of Lecture Notes in Computer Science, page 253-262. Springer, (2019)Multipath Routing for Video Streaming inWireless Mesh Networks., , and . Ad Hoc Sens. Wirel. Networks, 11 (1-2): 73-92 (2011)Ripple20 Vulnerabilities Detection using a Featureless Deep Learning Model., and . TrustCom, page 1236-1240. IEEE, (2023)ABSAC: Attribute-Based Access Control Model Supporting Anonymous Access for Smart Cities., , , , and . Secur. Commun. Networks, (2021)Anomaly Event Detection in Security Surveillance Using Two-Stream Based Model., , , , , , and . Secur. Commun. Networks, (2020)Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System., , , , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 379-390. Springer, (2015)A Formal Modeling Method based on CPN., , , , and . SMC, page 4994-4998. IEEE, (2006)A Novel Color Image Watermarking Algorithm Based on Digital Signature., , , , , and . iThings/GreenCom/CPSCom/SmartData, page 267-274. IEEE, (2019)