Stop deceiving! an effective defense scheme against voice impersonation attacks on smart devices W Huang, W Tang, H Jiang, J Luo, Y Zhang IEEE Internet of Things Journal 9 (7), 5304-5314, 2021 | 20 | 2021 |
A novel sequence tensor recovery algorithm for quick and accurate anomaly detection W Huang, K Xie, J Li IEEE Transactions on Network Science and Engineering 9 (5), 3531-3545, 2022 | 10 | 2022 |
Thwarting unauthorized voice eavesdropping via touch sensing in mobile systems W Huang, W Tang, K Zhang, H Zhu, Y Zhang IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 31-40, 2022 | 10 | 2022 |
Unauthorized microphone access restraint based on user behavior perception in mobile devices W Huang, W Tang, H Chen, H Jiang, Y Zhang IEEE Transactions on Mobile Computing 23 (1), 955-970, 2022 | 4 | 2022 |
Security Analysis of WiFi-based Sensing Systems: Threats from Perturbation Attacks H Cao, W Huang, G Xu, X Chen, Z He, J Hu, H Jiang, Y Fang arXiv preprint arXiv:2404.15587, 2024 | 1 | 2024 |
Recognizing Voice Spoofing Attacks Via Acoustic Nonlinearity Dissection for Mobile Devices W Huang, W Tang, H Jiang, Y Zhang IEEE Transactions on Mobile Computing, 2024 | | 2024 |
Manipulating Voice Assistants Eavesdropping via Inherent Vulnerability Unveiling in Mobile Systems W Huang, H Chen, H Cao, J Ren, H Jiang, Z Fu, Y Zhang IEEE Transactions on Mobile Computing, 2024 | | 2024 |