Cited By
View all- Jiang YJi XZhang JJiang YJiang SXu W(2024)CapSpeaker: Injecting Commands to Voice Assistants Via CapacitorsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.332618421:4(3295-3308)Online publication date: Jul-2024
- Yang LChen XJian XYang LLi YRen QChen YXue GJi XCalandrino JTroncoso C(2023)Remote attacks on speech recognition systems using sound from power supplyProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620493(4571-4588)Online publication date: 9-Aug-2023
- Ji XZhang JZou SChen YQu GXu W(2023)MagView++: Data Exfiltration via CPU Magnetic Signals Under Video DecodingIEEE Transactions on Mobile Computing10.1109/TMC.2023.326240023:3(2486-2503)Online publication date: 28-Mar-2023
- Show More Cited By