Cited By
View all- Mei LLiu RYin ZZhao QJiang WWang SWang SLu KHe T(2024)mmSpyVR: Exploiting mmWave Radar for Penetrating Obstacles to Uncover Privacy Vulnerability of Virtual RealityProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36997728:4(1-29)Online publication date: 21-Nov-2024
- Lee YSong WSong JNoh Y(2024)Extending EV Battery Lifetime: Digital Phenotyping Approach for Departure Time PredictionProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36997258:4(1-30)Online publication date: 21-Nov-2024
- Geloczi EPöhls HKlement FPosegga JKatzenbeisser SAyday EVaidya J(2024)Unveiling the Shadows: An Approach towards Detection, Precise Localization, and Effective Isolation of Concealed IoT Devices in Unfamiliar EnvironmentsProceedings of the 23rd Workshop on Privacy in the Electronic Society10.1145/3689943.3695040(109-123)Online publication date: 20-Nov-2024
- Show More Cited By