Trojan Attacks and Defense for Speech Recognition

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:MobiSec (5. : 2021 : Jeju; Online) Mobile internet security
1. Verfasser: Zong, Wei (VerfasserIn)
Weitere Verfasser: Chow, Yang-Wai (VerfasserIn), Susilo, Willy (VerfasserIn), Kim, Jongkil (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Distributed Trust and Reputation Services in Pervasive Internet-of-Things Deployments 2022 Bordel, Borja
The Design and Implementation of Blockchain-Assisted User Public-Private Key Generation Method 2022 Zhang, Tianhong
Smart Contract-Based Personal Data Protection Framework: In Cross-App Advertising 2022 Shi, Yuyuan
Forensic Analysis of Apple CarPlay: A Case Study 2022 Lee, Junsu
A DDoS Detection Method with Feature Set Dimension Reduction 2022 Li, Man
A Resource-Blockchain Framework for Safeguarding IoT 2022 Bharti, Monika
Fingerprint Defender: Defense Against Browser-Based User Tracking 2022 Moad, Deepali
Which One is More Robust to Low-Rate DDoS Attacks? The Multipath TCP or The SCTP 2022 Ji, Lejun
Classification and Analysis of Vulnerabilities in Mobile Device Infrastructure Interfaces 2022 Izrailov, Konstantin
A Blockchain-Based User Identity Authentication Method for 5G 2022 Tu, Zhe
An Anonymous Communication System Based on Software Defined Architecture 2022 Cheng, Xinda
Cyber-Attack Behavior Knowledge Graph Based on CAPEC and CWE Towards 6G 2022 Wang, Weilin
Security Association Model: Interdisciplinary Application of 5G Positioning Technology and Social Network 2022 Tao, Haoran
Comparative Analysis of Bluetooth LE and EDHOC for Potential Security Protocol in Artificial Pancreas System 2022 Duguma, Daniel Gerbi
A Necessary Condition for Industrial Internet of Things Sustainability 2022 Dakhnovich, Andrei
Effectiveness of Video-Classification in Android Malware Detection Through API-Streams and CNN-LSTM Autoencoders 2022 D’Angelo, Gianni
Ensuring the Big Data Integrity Through Verifiable Zero-Knowledge Operations 2022 Aleksandrova, Elena B.
Secure LoRaWAN Root Key Update Scheme for IoT Environment 2022 Tsai, Kun-Lin
A Credible Information Fusion Method Based on Cascaded Topology Interactive Traceability 2022 Gao, Yueging
Semantic Embedding-Based Entity Alignment for Cybersecurity Knowledge Graphs 2022 Kim, Minhwan
Alle Artikel auflisten