THE CRUX OF VOICE (IN)SECURITY: A BRAIN STUDY OF SPEAKER LEGITIMACY DETECTION

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (26. : 2019 : San Diego, Calif.) Network and Distributed System Security Symposium 2019 ; Volume 2 of 2
1. Verfasser: Neupane, Ajaya (VerfasserIn)
Weitere Verfasser: Saxena, Nitesh (VerfasserIn), Hirshfield, Leanne (VerfasserIn), Bratt, Sarah Elaine (VerfasserIn)
Pages:2019
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
DATA OBLIVIOUS ISA EXTENSIONS FOR SIDE CHANNEL-RESISTANT AND HIGH PERFORMANCE COMPUTING 2020 Yu, Jiyong
COCONUT: THRESHOLD ISSUANCE SELECTIVE DISCLOSURE CREDENTIALS WITH APPLICATIONS TO DISTRIBUTED LEDGERS 2020 Sonnino, Alberto
HOW TO END PASSWORD REUSE ON THE WEB 2020 Wang, Ke Coby
UWB WITH PULSE REORDERING: SECURING RANGING AGAINST RELAY AND PHYSICAL-LAYER ATTACKS 2020 Singh, Mridula
NEARBY THREATS: REVERSING, ANALYZING, AND ATTACKING GOOGLE'S 'NEARBY CONNECTIONS' ON ANDROID 2020 Antonioli, Daniele
RORAM: EFFICIENT RANGE ORAM WITH O(LOG2 N) LOCALITY 2020 Chakraborti, Anrin
PRIVATE CONTINUAL RELEASE OF REAL-VALUED DATA STREAMS 2020 Perrier, Victor
VAULT: FAST BOOTSTRAPPING FOR THE ALGORAND CRYPTOCURRENCY 2020 Leung, Derek
ESTABLISHING SOFTWARE ROOT OF TRUST UNCONDITIONALLY 2020 Gligor, Virgil D.
NEURO-SYMBOLIC EXECUTION: AUGMENTING SYMBOLIC EXECUTION WITH NEURAL CONSTRAINTS 2020 Shiqi, Shen
CODEALCHEMIST: SEMANTICS-AWARE CODE GENERATION TO FIND VULNERABILITIES IN JAVASCRIPT ENGINES 2020 Han, Hyungseok
PROFIT: DETECTING AND QUANTIFYING SIDE CHANNELS IN NETWORKED APPLICATIONS 2020 Rosner, Nicolás
UNDERSTANDING OPEN PORTS IN ANDROID APPLICATIONS: DISCOVERY, DIAGNOSIS, AND SECURITY ASSESSMENT 2020 Wu, Daoyuan
BADBLUETOOTH: BREAKING ANDROID SECURITY MECHANISMS VIA MALICIOUS BLUETOOTH PERIPHERALS 2020 Xu, Fenghao
IOTGUARD: DYNAMIC ENFORCEMENT OF SECURITY AND SAFETY POLICY IN COMMODITY IOT 2020 Celik, Z. Berkay
ICSREF: A FRAMEWORK FOR AUTOMATED REVERSE ENGINEERING OF INDUSTRIAL CONTROL SYSTEMS BINARIES 2020 Keliris, Anastasis
STATISTICAL PRIVACY FOR STREAMING TRAFFIC 2020 Zhang, Xiaokuan
ADVERSARIAL ATTACKS AGAINST AUTOMATIC SPEECH RECOGNITION SYSTEMS VIA PSYCHOACOUSTIC HIDING 2020 Schönherr, Lea
TIMBER-V: TAG-ISOLATED MEMORY BRINGING FINE-GRAINED ENCLAVES TO RISC-V 2020 Weiser, Samuel
ENEMY AT THE GATEWAYS: CENSORSHIP-RESILIENT PROXY DISTRIBUTION USING GAME THEORY 2020 Nasr, Milad
Alle Artikel auflisten