Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SoK: The Good, The Bad, and The Unbalanced: Measuring Structural Limitations of Deepfake Media Datasets., , , , , and . USENIX Security Symposium, USENIX Association, (2024)Managing uncertainty in electricity generation and demand forecasting., , , , , , , , and . IBM J. Res. Dev., (2016)Hear "No Evil", See "Kenansville"*: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems., , , , , , and . SP, page 712-729. IEEE, (2021)"Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences., , , , , , , , and . CCS, page 3433-3459. ACM, (2023)Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction., , , , , , , and . USENIX Security Symposium, page 2691-2708. USENIX Association, (2022)SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems., , , , and . SP, page 730-747. IEEE, (2021)Every Breath You Don't Take: Deepfake Speech Detection Using Breath., , , , , and . CoRR, (2024)Addressing theory and performance enhancements for the independent sustain and address AC plasma display. University of Illinois Urbana-Champaign, USA, (1990)Speed Optimization of the ALR Circuit Using an FPGA with Embedded RAM: A Design Experience., and . FPL, volume 1482 of Lecture Notes in Computer Science, page 278-287. Springer, (1998)Designing a Testable System on a Chip., , , , , , , , , and 5 other author(s). VTS, page 2-7. IEEE Computer Society, (1998)