Author of the publication

Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices.

, , , , , , and . USENIX Security Symposium, page 2667-2684. USENIX Association, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Seeing isn't Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors., , , , , and . ACM Conference on Computer and Communications Security, page 1989-2004. ACM, (2019)Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS., , , , , , , and . ACM Conference on Computer and Communications Security, page 31-43. ACM, (2015)ContextAD: Context-Aware Acronym Disambiguation with Siamese BERT Network., , , , and . Int. J. Intell. Syst., (2023)Understanding bandwidth-delay product in mobile ad hoc networks., , , and . Comput. Commun., 27 (10): 923-934 (2004)Identifying forged seal imprints using positive and unlabeled learning., , , , and . Multim. Tools Appl., 80 (20): 30761-30773 (2021)Multiscale Attention Feature Aggregation Network for Cloud and Cloud Shadow Segmentation., , , and . IEEE Trans. Geosci. Remote. Sens., (2023)Gaussian processes with skewed Laplace spectral mixture kernels for long-term forecasting., , and . Mach. Learn., 110 (8): 2213-2238 (2021)ncDENSE: a novel computational method based on a deep learning framework for non-coding RNAs family prediction., , , , , and . BMC Bioinform., 24 (1): 68 (December 2023)Combining ECN and RTT for Datacenter Transport., , , , , and . APNet, page 36-42. ACM, (2017)Spatial Quest: Game-Based Spatial Intelligence Training Using VR and Non-VR Platforms., , , , and . IVCNZ, page 1-6. IEEE, (2023)