Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems. | 0 | 0.34 | 2022 |
Experimental Security Analysis of the App Model in Business Collaboration Platforms | 0 | 0.34 | 2022 |
AEROKEY: Using Ambient Electromagnetic Radiation for Secure and Usable Wireless Device Authentication | 0 | 0.34 | 2022 |
CONFIDANT: A Privacy Controller for Social Robots | 0 | 0.34 | 2022 |
Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps. | 0 | 0.34 | 2022 |
SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks | 0 | 0.34 | 2022 |
Towards More Robust Keyword Spotting for Voice Assistants | 0 | 0.34 | 2022 |
The Roaming Edge and its Applications. | 0 | 0.34 | 2021 |
PriSEC: A Privacy Settings Enforcement Controller | 0 | 0.34 | 2021 |
Powercut And Obfuscator: An Exploration Of The Design Space For Privacy-Preserving Interventions For Smart Speakers | 0 | 0.34 | 2021 |
PEDRO: Secure Pedestrian Mobility Verification in V2P Communication using Commercial Off-the-shelf Mobile Devices | 0 | 0.34 | 2021 |
Kalεido - Real-Time Privacy Control for Eye-Tracking Systems. | 0 | 0.34 | 2021 |
The Privacy Policy Landscape After the GDPR | 2 | 0.36 | 2020 |
Preech - A System for Privacy-Preserving Speech Transcription. | 0 | 0.34 | 2020 |
Enhancing ML Robustness Using Physical-World Constraints. | 0 | 0.34 | 2019 |
Privacy Protection for Audio Sensing Against Multi-Microphone Adversaries. | 1 | 0.34 | 2019 |
Velody: Nonlinear Vibration Challenge-Response for Resilient User Authentication | 2 | 0.35 | 2019 |
Wearable Technology brings Security to Alexa and Siri. | 0 | 0.34 | 2018 |
The Privacy Policy Landscape After the GDPR. | 1 | 0.36 | 2018 |
Characterizing Privacy Perceptions of Voice Assistants: A Technology Probe Study. | 0 | 0.34 | 2018 |
Traversing the Quagmire that is Privacy in your Smart Home. | 1 | 0.37 | 2018 |
Speed Trap Optimal Patrolling: STOP Playing Stackelberg Security Games. | 0 | 0.34 | 2018 |
Continuous Authentication for Voice Assistants. | 22 | 0.81 | 2017 |
PriBots: Conversational Privacy with Chatbots. | 4 | 0.46 | 2016 |
RT-OPEX: Flexible Scheduling for Cloud-RAN Processing. | 5 | 0.49 | 2016 |
Privacy vs. Reward in Indoor Location-Based Services. | 0 | 0.34 | 2016 |
Protecting Privacy Of Ble Device Users | 10 | 0.68 | 2016 |
Replication enabled distributed cache invalidation method: replication enabled distributed cache management system for wireless mobile networks | 0 | 0.34 | 2015 |
LinkDroid: Reducing Unregulated Aggregation of App Usage Behaviors | 1 | 0.35 | 2015 |
PBCOV: a property-based coverage criterion | 2 | 0.37 | 2015 |
Anatomization and Protection of Mobile Apps’ Location Privacy Threats | 14 | 0.57 | 2015 |
Location Privacy Protection for Smartphone Users | 49 | 1.54 | 2014 |
Improving vehicular safety message delivery through the implementation of a cognitive vehicular network | 12 | 0.56 | 2013 |
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks | 14 | 0.67 | 2013 |
A two-layer cache replication scheme for dense mobile ad hoc networks | 1 | 0.36 | 2012 |
A privacy-preserving cache management system for MANETs | 1 | 0.35 | 2012 |
A proxy-based architecture for dynamic discovery and invocation of web services from mobile devices | 9 | 0.72 | 2012 |
Slow port scanning detection. | 5 | 0.44 | 2011 |
Fuzzy cognitive Vehicular Ad hoc Networks | 1 | 0.36 | 2011 |
Data delivery guarantees in congested Vehicular ad hoc networks using cognitive networks | 25 | 1.12 | 2011 |
Extending The Dsrc'S Control Channel Using Cognitive Networking Concepts And Fuzzy Logic | 1 | 0.36 | 2011 |
CRUST: Implementation of clustering and routing functions for mobile ad hoc networks using reactive tuple-spaces | 2 | 0.39 | 2009 |
Indoor Propagation Effects On Toa Bias For Joint Gnss And Terrestrial Radio Based Localization | 0 | 0.34 | 2009 |
A fast HTML web page change detection approach based on hashing and reducing the number of similarity computations | 5 | 0.46 | 2008 |