暂无分享,去创建一个
Mani Srivastava | Luis Garcia | Joseph Noor | Akash Deep Singh | M. Srivastava | Joseph Noor | Luis Garcia
[1] Franck Le,et al. DeviceMien: network device behavior modeling for identifying unknown IoT devices , 2019, IoTDI.
[2] Christine Julien,et al. Comparative evaluation of Received Signal-Strength Index (RSSI) based indoor localization techniques for construction jobsites , 2011, Adv. Eng. Informatics.
[3] Kevin Wu,et al. Do You See What I See?Detecting Hidden Streaming Cameras Through Similarity of Simultaneous Observation , 2019, 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom.
[4] Sebastián García,et al. Spy vs. Spy: A modern study of microphone bugs operation and detection , 2017 .
[5] Adi Shamir,et al. Drones' Cryptanalysis - Smashing Cryptography with a Flicker , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[6] Ahmad-Reza Sadeghi,et al. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[7] Jun Huang,et al. Detecting Wireless Spy Cameras Via Stimulating and Probing , 2018, MobiSys.
[8] Veton Kepuska,et al. Next-generation of virtual personal assistants (Microsoft Cortana, Apple Siri, Amazon Alexa and Google Home) , 2018, 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC).
[9] Yuval Elovici,et al. ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis , 2017, SAC.
[10] Haitao Wu,et al. Footprint: cellular assisted Wi-Fi AP discovery on mobile phones for energy saving , 2009, WINTECH '09.
[11] Jaap C. Haartsen,et al. The Bluetooth radio system , 2000, IEEE Personal Communications.
[12] Cynthia Fraser,et al. Intimate Partner Violence, Technology, and Stalking , 2007, Violence against women.
[13] Rajarshi Gupta,et al. All Things Considered: An Analysis of IoT Devices on Home Networks , 2019, USENIX Security Symposium.
[14] Jonathan D. Fuller,et al. Misuse-based detection of Z-Wave network attacks , 2017, Comput. Secur..
[15] Charles V. Wright,et al. Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[16] D. G. Green,et al. Sinusoidal flicker characteristics of the color-sensitive mechanisms of the eye. , 1969, Vision research.
[17] H. Haas,et al. Pedestrian Dead Reckoning : A Basis for Personal Positioning , 2006 .
[18] S. R. Jondhale,et al. Issues and challenges in RSSI based target localization and tracking in wireless sensor networks , 2016, 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT).
[19] Kegen Yu,et al. Improved Wi-Fi RSSI Measurement for Indoor Localization , 2017, IEEE Sensors Journal.
[20] Haipeng Li,et al. I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers , 2019, 2019 IEEE Conference on Communications and Network Security (CNS).
[21] Nick Feamster,et al. IoT Inspector: Crowdsourcing Labeled Network Traffic from Smart Home Devices at Scale , 2019, ArXiv.
[22] Konstantin Beznosov,et al. Android Rooting: Methods, Detection, and Evasion , 2015, SPSM@CCS.
[23] Ben Y. Zhao,et al. Adversarial Localization against Wireless Cameras , 2018, HotMobile.
[24] Wenyuan Xu,et al. DeWiCam: Detecting Hidden Wireless Cameras via Smartphones , 2018, AsiaCCS.
[25] Aaron Striegel,et al. Is There WiFi Yet?: How Aggressive Probe Requests Deteriorate Energy and Throughput , 2015, Internet Measurement Conference.
[26] Nick Feamster,et al. Enhancing Transparency: Internet Video Quality Inference from Network Traffic , 2018 .
[27] C. Granger. Investigating causal relations by econometric models and cross-spectral methods , 1969 .
[28] Mani Srivastava,et al. RadHAR: Human Activity Recognition from Point Clouds Generated through a Millimeter-wave Radar , 2019, mmNets.
[29] Siyang Cao,et al. Real-Time Human Motion Behavior Detection via CNN Using mmWave Radar , 2019, IEEE Sensors Letters.
[30] Stephan Wenger,et al. H.264/AVC over IP , 2003, IEEE Trans. Circuits Syst. Video Technol..
[31] Ke Gao,et al. A passive approach to wireless device fingerprinting , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[32] Nick Feamster,et al. Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping , 2018, Proc. Priv. Enhancing Technol..
[33] Maurizio Dusi,et al. Traffic classification through simple statistical fingerprinting , 2007, CCRV.
[34] Yuxiang Sun,et al. WiFi signal strength-based robot indoor localization , 2014, 2014 IEEE International Conference on Information and Automation (ICIA).
[35] Muneer Bani Yassein,et al. Smart homes automation using Z-wave protocol , 2016, 2016 International Conference on Engineering & MIS (ICEMIS).
[36] Raheem A. Beyah,et al. Information Leakage in Encrypted IP Video Traffic , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[37] Zhiqiang Lin,et al. Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps , 2019, CCS.