CORC

浏览/检索结果: 共7条,第1-7条 帮助

已选(0)清除 条数/页:   排序方式:
You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones 其他
2017-01-01
作者:  Chen, Si;  Ren, Kui;  Piao, Sixu;  Wang, Cong;  Wang, Qian
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones 其他
2017-01-01
作者:  Chen, Si;  Ren, Kui;  Piao, Sixu;  Wang, Cong;  Wang, Qian
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/05
You Can Hear but You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones 会议论文
作者:  Chen, Si;  Ren, Kui;  Piao, Sixu;  Wang, Cong;  Wang, Qian
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones 其他
2017-01-01
作者:  Chen, Si;  Ren, Kui;  Piao, Sixu;  Wang, Cong;  Wang, Qian
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
You Can Hear but You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones 期刊论文
Proceedings - International Conference on Distributed Computing Systems, 2017
作者:  Chen, Si;  Ren, Kui;  Piao, Sixu;  Wang, Cong;  Wang, Qian
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05
Wireless Physical-Layer Identification: Modeling and Validation 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016
Wang, Wenhao; Sun, Zhi; Piao, Sixu; Zhu, Bocheng; Ren, Kui
收藏  |  浏览/下载:5/0  |  提交时间:2017/12/04
You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones 会议论文
Atlanta, GA, JUN 05-08, 2017
作者:  Chen, Si[1,2];  Ren, Kui[1];  Piao, Sixu[1];  Wang, Cong[3];  Wang, Qian[4]
收藏  |  浏览/下载:0/0  |  提交时间:2019/12/06


©版权所有 ©2017 CSpace - Powered by CSpace