Author of the publication

Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition.

, , , and . WOOT, USENIX Association, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hidden Voice Commands., , , , , , , and . USENIX Security Symposium, page 513-530. USENIX Association, (2016)Whisper: a unilateral defense against VoIP traffic re-identification attacks., , and . ACSAC, page 286-296. ACM, (2019)Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor., , and . USENIX Security Symposium, page 1823-1840. USENIX Association, (2019)Does Being Verified Make You More Credible?: Account Verification's Effect on Tweet Credibility., , , and . CHI, page 525. ACM, (2019)You Talk Too Much: Limiting Privacy Exposure Via Voice Input., and . IEEE Symposium on Security and Privacy Workshops, page 84-91. IEEE, (2019)Where art thou, Eve? Experiences laying traps for Internet eavesdroppers., , , and . CSET @ USENIX Security Symposium, USENIX Association, (2017)Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones (Transcript of Discussion)., and . Security Protocols Workshop, volume 9379 of Lecture Notes in Computer Science, page 91-104. Springer, (2015)Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones., and . Security Protocols Workshop, volume 9379 of Lecture Notes in Computer Science, page 80-90. Springer, (2015)Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition., , , and . WOOT, USENIX Association, (2015)Ephemeral Exit Bridges for Tor., , , , and . DSN, page 253-265. IEEE, (2020)