Author:
Zhang Zhenfei,Li Ping,Zhu Biaokai,Dong Chong,Lv Zhao L.
Reference11 articles.
1. Backdoor: Making microphones hear inaudible sounds;Roy,2017
2. Dolphin attack: Inaudible voice commands;Zhang,2017
3. Proceedings 2020 Network and Distributed System Security Symposium
4. Gyrophone: Recognizing speech from gyroscope signals;Michalevsky;23rd {USENIX} Security Symposium ({USENIX} Security 14),2014
5. Inertiear: Automatic and device-independent imu based eavesdropping on smartphones;Gao,2022