Cited By
View all- Xiao GLing ZFan QXu XWu WDing DChen CFu X(2024)Pivot: Panoramic-image-based VR User Authentication against Side-Channel AttacksACM Transactions on Multimedia Computing, Communications, and Applications10.1145/3694975Online publication date: 9-Sep-2024
- Chen YYu JChen YKong LZhu YChen YOkoshi TKo JLiKamWa R(2024)RFSpy: Eavesdropping on Online Conversations with Out-of-Vocabulary Words by Sensing Metal Coil Vibration of Headsets Leveraging RFIDProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661887(169-182)Online publication date: 3-Jun-2024
- Yuan JYang CCai DWang SYuan XZhang ZLi XZhang DMei HJia XWang SXu MGanesan DLane NShi W(2024)Mobile Foundation Model as FirmwareProceedings of the 30th Annual International Conference on Mobile Computing and Networking10.1145/3636534.3649361(279-295)Online publication date: 29-May-2024
- Show More Cited By