暂无分享,去创建一个
[1] Yali Liu,et al. Wavelet-Based Traffic Analysis for Identifying Video Streams over Broadband Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[2] Hao Wu,et al. Controlling UAVs with Sensor Input Spoofing Attacks , 2016, WOOT.
[3] Biswanath Mukherjee,et al. Video Streaming Forensic - Content Identification with Traffic Snooping , 2010, ISC.
[4] Tadayoshi Kohno,et al. Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing , 2007, USENIX Security Symposium.
[5] Peter D. Symes. Video Compression , 1998 .
[6] D. Marpe,et al. Video coding with H.264/AVC: tools, performance, and complexity , 2004, IEEE Circuits and Systems Magazine.
[7] Vitaly Shmatikov,et al. Beauty and the Burst: Remote Identification of Encrypted Video Streams , 2017, USENIX Security Symposium.
[8] Charles V. Wright,et al. Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[9] Matthew Peacock,et al. Towards detection and control of civilian unmanned aerial vehicles , 2013 .
[10] Peter Wellig,et al. Detection and tracking of drones using advanced acoustic cameras , 2015, SPIE Security + Defence.
[11] Brian D. Rigling,et al. Multisensor 3D tracking for counter small unmanned air vehicles (CSUAV) , 2008, SPIE Defense + Commercial Sensing.
[12] Andrew Reed,et al. Leaky streams: Identifying variable bitrate DASH videos streamed over encrypted 802.11n connections , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[13] Djordje Mitrovic. Video Compression , 2006 .
[14] Andrew Reed,et al. Identifying HTTPS-Protected Netflix Videos in Real-Time , 2017, CODASPY.
[15] Ajay Luthra,et al. Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..
[16] Fabian Monrose,et al. Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks , 2011, 2011 IEEE Symposium on Security and Privacy.
[17] Ivan Martinovic,et al. Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones , 2017, NDSS.
[18] Raheem A. Beyah,et al. Information Leakage in Encrypted IP Video Traffic , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[19] Keith Jack,et al. Video Demystified: A Handbook for the Digital Engineer , 1993 .
[20] B.D. Rigling,et al. Low-Cost Acoustic Array for Small UAV Detection and Tracking , 2008, 2008 IEEE National Aerospace and Electronics Conference.
[21] Yongdae Kim,et al. Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors , 2015, USENIX Security Symposium.
[22] Charles V. Wright,et al. Language Identification of Encrypted VoIP Traffic: Alejandra y Roberto or Alice and Bob? , 2007, USENIX Security Symposium.
[23] Vincent Lepetit,et al. Flying objects detection from a single moving camera , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).