Author of the publication

An Ultrasonic Sensor Transformation Attack Scheme Based on Phoneme Modification.

, , , , , and . ICAICE, page 910-918. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Iterative reproducing kernel method for nonlinear oscillator with discontinuity., and . Appl. Math. Lett., 23 (10): 1301-1304 (2010)Ultrannel: Ultrasound based Covert Communication Channel., , , , , , and . SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta, page 1760-1767. IEEE, (2022)Corpus-based Extraction of Chinese Historical Term Translation Equivalents., , , , and . Int. J. of Asian Lang. Proc., 20 (2): 63-74 (2010)Research of CPA Attack Methods Based on Ant Colony Algorithm., , , , , and . SecureComm (1), volume 398 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 270-286. Springer, (2021)An Ultrasonic Sensor Transformation Attack Scheme Based on Phoneme Modification., , , , , and . ICAICE, page 910-918. ACM, (2023)A new kernel functions based approach for solving 1-D interface problems., and . Appl. Math. Comput., (2020)A discrete epidemic model with stage structure, and . Chaos, Solitons & Fractals, 26 (3): 947--958 (November 2005)DBS Application to Chinese Adjectives., , , and . CIS, page 1466-1470. IEEE Computer Society, (2011)Identity-Based Conference Key Distribution Scheme Using Sealed Lock., and . ACIS-ICIS, page 282-286. IEEE Computer Society, (2008)Extracting historical terms based on aligned Chinese-English parallel corpora., , , and . NLPKE, page 1-6. IEEE, (2009)