Author of the publication

SpiralSpy: Exploring a Stealthy and Practical Covert Channel to Attack Air-gapped Computing Devices via mmWave Sensing.

, , , , , , , , and . NDSS, The Internet Society, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blind Recognition of Touched Keys on Mobile Devices., , , , , and . ACM Conference on Computer and Communications Security, page 1403-1414. ACM, (2014)Attribute-based fine-grained access control with efficient revocation in cloud storage systems., , and . AsiaCCS, page 523-528. ACM, (2013)Task-aware Similarity Learning for Event-triggered Time Series., , , , and . CoRR, (2022)Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks., , and . IEEE Trans. Wirel. Commun., 7 (1): 354-363 (2008)Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations., , , and . IEEE Trans. Parallel Distributed Syst., 24 (6): 1172-1181 (2013)Inverse transport calculations in optical imaging with subspace optimization algorithms., and . J. Comput. Phys., (2014)A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses., , , , , , , and . IEEE Commun. Surv. Tutorials, 24 (4): 2292-2328 (2022)Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids., , , , and . IEEE Netw., 31 (1): 59-63 (2017)Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices., , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 6 (2): 77:1-77:26 (2022)MsDroid: Identifying Malicious Snippets for Android Malware Detection., , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (3): 2025-2039 (May 2023)