I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers S Kennedy, H Li, C Wang, H Liu, B Wang, W Sun 2019 IEEE Conference on Communications and Network Security (CNS), 232-240, 2019 | 74 | 2019 |
A DCNN based fingerprint liveness detection algorithm with voting strategy C Wang, K Li, Z Wu, Q Zhao Biometric Recognition: 10th Chinese Conference, CCBR 2015, Tianjin, China …, 2015 | 66 | 2015 |
Fingerprinting encrypted voice traffic on smart speakers with deep learning C Wang, S Kennedy, H Li, K Hudson, G Atluri, X Wei, W Sun, B Wang Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020 | 57 | 2020 |
Adaptive Fingerprinting: Website Fingerprinting over Few Encrypted Traffic C Wang, J Dani, X Li, X Jia, B Wang Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021 | 36 | 2021 |
RadioNet: Robust Deep-Learning Based Radio Fingerprinting H Li, K Gupta, C Wang, N Ghose, B Wang 2022 IEEE Conference on Communications and Network Security (CNS), 190-198, 2022 | 18 | 2022 |
TripletPower: Deep-Learning Side-Channel Attacks over Few Traces C Wang, J Dani, S Reilly, A Brownfield, B Wang, JM Emmert 2023 IEEE International Symposium on Hardware Oriented Security and Trust …, 2023 | 6 | 2023 |
EcoBoost: Efficient Bootstrapping for Confidential Transactions C Wang, B Wang, X Fan 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1-3, 2020 | 3 | 2020 |
Portability of Deep-Learning Side-Channel Attacks against Software Discrepancies C Wang, M Ninan, S Reilly, J Ward, W Hawkins, B Wang, JM Emmert Proceedings of the 16th ACM Conference on Security and Privacy in Wireless …, 2023 | 2 | 2023 |
Robust deep-learning-based radio fingerprinting with fine-tuning H Li, C Wang, N Ghose, B Wang Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021 | 2 | 2021 |
POSTER: Robust Deep-learning-based Radio Fingerprinting with Fine-Tuning H Li, C Wang, N Ghose, B Wang Proc. ACM WiSec 21, 2021 | 2 | 2021 |
Sparser: Secure Nearest Neighbor Search with Space-filling Curves S Fang, S Kennedy, C Wang, B Wang, Q Pei, X Liu IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020 | 2 | 2020 |
Towards Robust Side-Channel Attacks With Machine Learning C Wang University of Cincinnati, 2022 | | 2022 |
基于奇异点的字典模型指纹方向场去噪方法. 王成钢, 赵启军, 吴志红 Application Research of Computers/Jisuanji Yingyong Yanjiu 33 (5), 2016 | | 2016 |