Author of the publication

An Escalated Eavesdropping Attack on Mobile Devices via Low-Resolution Vibration Signals.

, , , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 3037-3050 (July 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ACM KDD AI4Cyber/MLHat: Workshop on AI-enabled Cybersecurity Analytics and Deployable Defense., , , , , and . KDD, page 4900-4901. ACM, (2022)Suggesting Alternatives for Potentially Insecure Artificial Intelligence Repositories: An Unsupervised Graph Embedding Approach., , , and . HICSS, page 548-556. ScholarSpace, (2024)An Escalated Eavesdropping Attack on Mobile Devices via Low-Resolution Vibration Signals., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 3037-3050 (July 2023)Towards Privacy-Preserving Depression Detection: Experiments on Passive Sensor Signal Data., , , , and . ICDH, page 115-117. IEEE, (2023)Linking Personally Identifiable Information from the Dark Web to the Surface Web: A Deep Entity Resolution Approach., , , , , , , , and . ICDM (Workshops), page 488-495. IEEE, (2020)Disrupting Ransomware Actors on the Bitcoin Blockchain: A Graph Embedding Approach., , , and . ISI, page 1-6. IEEE, (2023)Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence., , , and . ISI, page 13-18. IEEE, (2017)Exploring hacker assets in underground forums., , and . ISI, page 31-36. IEEE, (2015)Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF)., , and . ACM Trans. Priv. Secur., 23 (4): 21:1-21:33 (2020)A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics: Connecting Data, Algorithms, and Systems., , and . ACM Trans. Manag. Inf. Syst., 12 (1): 1:1-1:18 (2021)