Author of the publication

A Small Sticker is Enough: Spoofing Face Recognition Systems via Small Stickers.

, , , and . EITCE, page 1075-1082. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Nonlinearity-Based Secure Face-to-Face Device Authentication for Mobile Devices., , , , and . IEEE Trans. Mob. Comput., 21 (4): 1155-1171 (2022)Which One to Go: Security and Usability Evaluation of Mid-Air Gestures., , , , , , and . CoRR, (2018)Validating the Contextual Information of Outdoor Images for Photo Misuse Detection., , , , , and . CoRR, (2018)Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Regional Patterns and Vulnerability Analysis of Chinese Web Passwords., , , and . IEEE Trans. Inf. Forensics Secur., 11 (2): 258-272 (2016)V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization., , , , , and . USENIX Security Symposium, page 5181-5198. USENIX Association, (2023)Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks., , , , , , and . USENIX Security Symposium, page 2455-2472. USENIX Association, (2023)Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges., , , , , and . SACMAT, page 49-50. ACM, (2016)DeWiCam: Detecting Hidden Wireless Cameras via Smartphones., , , and . AsiaCCS, page 1-13. ACM, (2018)Channel surfing: defending wireless sensor networks from interference., , and . IPSN, page 499-508. ACM, (2007)