From post

Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems.

, , , , , и . IEEE Symposium on Security and Privacy, стр. 1381-1396. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Reflected Search Poisoning for Illicit Promotion., , , и . CoRR, (2024)Enabling Privacy-Preserving Cyber Threat Detection with Federated Learning., , , и . CoRR, (2024)Port Forwarding Services Are Forwarding Security Risks., , , , и . CoRR, (2024)Demystifying Decentralized Matrix Communication Network: Ecosystem and Security., , , , , и . ICPADS, стр. 260-267. IEEE, (2023)Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment., , , , , , , , и . USENIX Security Symposium, стр. 593-608. USENIX Association, (2017)An empirical characterization of IFTTT: ecosystem, usage, and performance., , , и . Internet Measurement Conference, стр. 398-404. ACM, (2017)Shining Light into the Tunnel: Understanding and Classifying Network Traffic of Residential Proxies., , , и . CoRR, (2024)Stealthy Peers: Understanding Security and Privacy Risks of Peer-Assisted Video Streaming., , , , , и . DSN, стр. 324-337. IEEE, (2024)Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks., , , , , и . NDSS, The Internet Society, (2021)Understanding iOS-based Crowdturfing Through Hidden UI Analysis., , , , , , и . USENIX Security Symposium, стр. 765-781. USENIX Association, (2019)