Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition., , , , , , , , , and . USENIX Security Symposium, page 49-64. USENIX Association, (2018)All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo., , , , , , and . GLOBECOM, page 1-6. IEEE, (2018)Enhancing Privacy Preservation in Federated Learning via Learning Rate Perturbation., , , , , and . ICCV, page 4749-4758. IEEE, (2023)SPD Data Dimensionality Reduction based on SPD Manifold Tangent Space and Local LDA., , and . ICACS, page 68-73. ACM, (2021)SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems., , , , , , and . ACM Trans. Priv. Secur., 25 (3): 17:1-17:31 (2022)SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems., , , , , , and . CoRR, (2021)Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices., , , , , , and . USENIX Security Symposium, page 2667-2684. USENIX Association, (2020)Manipulating Users' Trust on Amazon Echo: Compromising Smart Home from Outside., , , , , and . EAI Endorsed Trans. Security Safety, 6 (22): e3 (2020)Dimensionality reduction algorithm of tensor data based on orthogonal tucker decomposition and local discrimination difference., , and . Appl. Intell., 52 (12): 14518-14540 (2022)