关注
Wenbin Huang(黄文斌)
Wenbin Huang(黄文斌)
在 nuist.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Stop deceiving! an effective defense scheme against voice impersonation attacks on smart devices
W Huang, W Tang, H Jiang, J Luo, Y Zhang
IEEE Internet of Things Journal 9 (7), 5304-5314, 2021
202021
A novel sequence tensor recovery algorithm for quick and accurate anomaly detection
W Huang, K Xie, J Li
IEEE Transactions on Network Science and Engineering 9 (5), 3531-3545, 2022
102022
Thwarting unauthorized voice eavesdropping via touch sensing in mobile systems
W Huang, W Tang, K Zhang, H Zhu, Y Zhang
IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 31-40, 2022
102022
Unauthorized microphone access restraint based on user behavior perception in mobile devices
W Huang, W Tang, H Chen, H Jiang, Y Zhang
IEEE Transactions on Mobile Computing 23 (1), 955-970, 2022
42022
Security Analysis of WiFi-based Sensing Systems: Threats from Perturbation Attacks
H Cao, W Huang, G Xu, X Chen, Z He, J Hu, H Jiang, Y Fang
arXiv preprint arXiv:2404.15587, 2024
12024
Recognizing Voice Spoofing Attacks Via Acoustic Nonlinearity Dissection for Mobile Devices
W Huang, W Tang, H Jiang, Y Zhang
IEEE Transactions on Mobile Computing, 2024
2024
Manipulating Voice Assistants Eavesdropping via Inherent Vulnerability Unveiling in Mobile Systems
W Huang, H Chen, H Cao, J Ren, H Jiang, Z Fu, Y Zhang
IEEE Transactions on Mobile Computing, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–7