Author:
Shirvanian Maliheh,Vo Summer,Saxena Nitesh
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Is Your Kettle Smarter Than a Hacker? A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices;2024 IEEE International Conference on Pervasive Computing and Communications (PerCom);2024-03-11
2. Secure User Verification and Continuous Authentication Via Earphone IMU;IEEE Transactions on Mobile Computing;2022
3. "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World;Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security;2021-11-12
4. A broad review on non-intrusive active user authentication in biometrics;Journal of Ambient Intelligence and Humanized Computing;2021-06-04
5. Voice In Ear;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies;2021-03-19