暂无分享,去创建一个
[1] Keld K. Jensen,et al. Timbre Models of Musical Sounds , 1999 .
[2] Oktay Ureten,et al. Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.
[3] G. Lemarquand,et al. Towards high fidelity high efficiency MEMS microspeakers , 2010, 2010 IEEE Sensors.
[4] Srinivasan Seshan,et al. 802.11 user fingerprinting , 2007, MobiCom '07.
[5] Yiming Yang,et al. A Comparative Study on Feature Selection in Text Categorization , 1997, ICML.
[6] Martín Abadi,et al. Host Fingerprinting and Tracking on the Web: Privacy and Security Implications , 2012, NDSS.
[7] Jr. J.P. Campbell,et al. Speaker recognition: a tutorial , 1997, Proc. IEEE.
[8] T. Kohno,et al. Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[9] Desmond Loh Chin Choong,et al. Identifying unique devices through wireless fingerprinting , 2008, WiSec '08.
[10] Simon A. Cole,et al. Suspect Identities , 2001 .
[11] C. H. Chen,et al. Signal processing handbook , 1988 .
[12] Hovav Shacham,et al. Fingerprinting Information in JavaScript Implementations , 2011 .
[13] Tao Li,et al. A comparative study on content-based music genre classification , 2003, SIGIR.
[14] Ton Kalker,et al. A Highly Robust Audio Fingerprinting System , 2002, ISMIR.
[15] Arun Ross,et al. Information fusion in biometrics , 2003, Pattern Recognit. Lett..
[16] Hynek Hermansky,et al. Spectral entropy based feature for robust ASR , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[17] C. Harte,et al. Detecting harmonic change in musical audio , 2006, AMCMM '06.
[18] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[19] M. Riezenman. Cellular security: better, but foes still lurk , 2000 .
[20] Frank Piessens,et al. FPDetective: dusting the web for fingerprinters , 2013, CCS.
[21] Bertan Bakkaloglu,et al. A Compact and Low-Cost MEMS Loudspeaker for Digital Hearing Aids , 2009, IEEE Transactions on Biomedical Circuits and Systems.
[22] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[23] Claude Castelluccia,et al. On the uniqueness of Web browsing history patterns , 2014, Ann. des Télécommunications.
[24] Tzi-cker Chiueh,et al. Sequence Number-Based MAC Address Spoof Detection , 2005, RAID.
[25] François Pachet,et al. ON THE USE OF ZERO-CROSSING RATE FOR AN APPLICATION OF CLASSIFICATION OF PERCUSSIVE SOUNDS , 2000 .
[26] Arun Ross,et al. Information fusion in biometrics , 2003, Pattern Recognit. Lett..
[27] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[28] Thomas G. Dietterich. Multiple Classifier Systems , 2000, Lecture Notes in Computer Science.
[29] Wenyuan Xu,et al. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable , 2014, NDSS.
[30] Douglas A. Reynolds,et al. A Tutorial on Text-Independent Speaker Verification , 2004, EURASIP J. Adv. Signal Process..
[31] Hao Chen,et al. AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale , 2012, TRUST.
[32] Lorrie Faith Cranor,et al. A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.
[33] Jeroen Breebaart,et al. Features for audio and music classification , 2003, ISMIR.
[34] Guodong Guo,et al. Content-based audio classification and retrieval by support vector machines , 2003, IEEE Trans. Neural Networks.
[35] Mani Mina,et al. Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach , 2006, NDSS.
[36] Pedro Cano,et al. A Review of Audio Fingerprinting , 2005, J. VLSI Signal Process..
[37] Guy Lapalme,et al. A systematic analysis of performance measures for classification tasks , 2009, Inf. Process. Manag..
[38] Yuval Elovici,et al. Google Android: A Comprehensive Security Assessment , 2010, IEEE Security & Privacy.
[39] Douglas A. Reynolds,et al. Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..
[40] Ian T. Nabney,et al. Netlab: Algorithms for Pattern Recognition , 2002 .
[41] Rong Zheng,et al. Device fingerprinting to enhance wireless security using nonparametric Bayesian method , 2011, 2011 Proceedings IEEE INFOCOM.
[42] Gregory H. Wakefield,et al. Audio thumbnailing of popular music using chroma-based representations , 2005, IEEE Transactions on Multimedia.
[43] D. Rubin,et al. Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .
[44] Donald F. Towsley,et al. Estimation and removal of clock skew from network delay measurements , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[45] Yajin Zhou,et al. Taming Information-Stealing Smartphone Applications (on Android) , 2011, TRUST.
[46] S. R. Huang,et al. A silicon microspeaker for hearing instruments , 2004 .
[47] P. Juslin,et al. Cue Utilization in Communication of Emotion in Music Performance: Relating Performance to Perception Studies of Music Performance , 2022 .
[48] George Tzanetakis,et al. Musical genre classification of audio signals , 2002, IEEE Trans. Speech Audio Process..
[49] Takuya Fujishima,et al. Realtime Chord Recognition of Musical Sound: a System Using Common Lisp Music , 1999, ICMC.
[50] James D. Johnston,et al. Transform coding of audio signals using perceptual noise criteria , 1988, IEEE J. Sel. Areas Commun..
[51] Christopher Krügel,et al. PiOS: Detecting Privacy Leaks in iOS Applications , 2011, NDSS.
[52] Sneha Kumar Kasera,et al. Robust location distinction using temporal link signatures , 2007, MobiCom '07.
[53] Isabelle Guyon,et al. An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..
[54] Peter Eckersley,et al. How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.
[55] Beth Logan,et al. Mel Frequency Cepstral Coefficients for Music Modeling , 2000, ISMIR.
[56] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[57] L. E. Langley,et al. Specific emitter identification (SEI) and classical parameter fusion technology , 1993, Proceedings of WESCON '93.
[58] Damon McCoy,et al. Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting , 2006, USENIX Security Symposium.
[59] Wenyuan Xu,et al. Securing wireless systems via lower layer enforcements , 2006, WiSe '06.