Cited By
View all- Shang KHe WZhang S(2024)Review on Security Defense Technology Research in Edge Computing EnvironmentChinese Journal of Electronics10.23919/cje.2022.00.17033:1(1-18)Online publication date: Jan-2024
- Yang LChen XJian XYang LLi YRen QChen YXue GJi XCalandrino JTroncoso C(2023)Remote attacks on speech recognition systems using sound from power supplyProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620493(4571-4588)Online publication date: 9-Aug-2023
- Majors JBarsallo Yi EMaji AWu DBagchi SMachiry A(2023)Security Properties of Virtual Remotes and SPOOKing their violationsProceedings of the 2023 ACM Asia Conference on Computer and Communications Security10.1145/3579856.3582834(841-854)Online publication date: 10-Jul-2023
- Show More Cited By