Author of the publication

VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones.

, , , , , , and . INFOCOM, page 2062-2070. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain Security: A Survey of Techniques and Research Directions., , , , and . IEEE Trans. Serv. Comput., 15 (4): 2490-2510 (2022)Control Theory-Inspired Model Design for Single Image De-Raining., and . IEEE Trans. Circuits Syst. II Express Briefs, 69 (2): 649-653 (2022)Effective Pan-Sharpening by Multiscale Invertible Neural Network and Heterogeneous Task Distilling., , , , and . IEEE Trans. Geosci. Remote. Sens., (2022)Learning Deep Multiscale Local Dissimilarity Prior for Pansharpening., , , , , , and . IEEE Trans. Geosci. Remote. Sens., (2023)ReinforceNet: A reinforcement learning embedded object detection framework with region selection network., , , , , , and . Neurocomputing, (2021)Mitigating Link-flooding Attacks With Active Link Obfuscation., , , , and . CoRR, (2017)PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (2): 1228-1242 (March 2023)Random Weights Networks Work as Loss Prior Constraint for Image Restoration., , , , , , , and . CoRR, (2023)Memory-augmented Deep Unfolding Network for Guided Image Super-resolution., , , , , and . CoRR, (2022)Hidden Voice Commands: Attacks and Defenses on the VCS of Autonomous Driving Cars., , , , , and . IEEE Wirel. Commun., 26 (5): 128-133 (2019)