Author of the publication

PIANO: Proximity-Based User Authentication on Voice-Powered Internet-of-Things Devices.

, , , , , , , and . ICDCS, page 2212-2219. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Honey Badger of BFT Protocols., , , , and . ACM Conference on Computer and Communications Security, page 31-42. ACM, (2016)Effective and Efficient Federated Tree Learning on Hybrid Data., , , , , , , and . CoRR, (2023)How You Act Tells a Lot: Privacy-Leakage Attack on Deep Reinforcement Learning., , , , , and . CoRR, (2019)The False Promise of Imitating Proprietary LLMs., , , , , , , and . CoRR, (2023)Towards Defending Multiple Adversarial Perturbations via Gated Batch Normalization., , , , , , , and . CoRR, (2020)Keystone: an open framework for architecting trusted execution environments., , , , and . EuroSys, page 38:1-38:16. ACM, (2020)Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation., , , , , and . ECCV (10), volume 11214 of Lecture Notes in Computer Science, page 220-237. Springer, (2018)Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time., , , , , , and . CCS, page 159-177. ACM, (2021)Decentralizing Custodial Wallets with MFKDF., and . ICBC, page 1-9. IEEE, (2023)Exploiting Network Structure for Proactive Spam Mitigation., , , , and . USENIX Security Symposium, USENIX Association, (2007)