Detecting Wireless Spy Cameras Via Stimulating and Probing
暂无分享,去创建一个
Jun Huang | Tian Liu | Rui Tan | Ziyu Liu | Zhen Tan | Rui Tan | Jun Huang | Ziyu Liu | Tian Liu | Zhen Tan
[1] Dario Rossi,et al. Revealing skype traffic: when randomness plays with you , 2007, SIGCOMM '07.
[2] Adi Shamir,et al. Game of Drones - Detecting Streamed POI from Encrypted FPV Channel , 2018, ArXiv.
[3] Xun Gong,et al. Fingerprinting websites using remote traffic analysis , 2010, CCS '10.
[4] Robert L. Wolpert,et al. Statistical Inference , 2019, Encyclopedia of Social Network Analysis and Mining.
[5] Qi Zhang,et al. Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic , 2016, WOOT.
[6] Marco Mellia,et al. Revealing skype traffic: when randomness plays with you , 2007, SIGCOMM 2007.
[7] Brijesh Joshi,et al. Touching from a distance: website fingerprinting attacks and defenses , 2012, CCS.
[8] Walid Dabbous,et al. Network characteristics of video streaming traffic , 2011, CoNEXT '11.
[9] Nino Vincenzo Verde,et al. Can't You Hear Me Knocking: Identification of User Actions on Android Apps via Traffic Analysis , 2014, CODASPY.
[10] C W Tyler,et al. Analysis of visual modulation sensitivity. II. Peripheral retina and the role of photoreceptor dimensions. , 1985, Journal of the Optical Society of America. A, Optics and image science.
[11] Charles V. Wright,et al. On Inferring Application Protocol Behaviors in Encrypted Network Traffic , 2006, J. Mach. Learn. Res..
[12] Ke Zhou,et al. Human visual cortex responds to invisible chromatic flicker , 2007, Nature Neuroscience.
[13] Sebastian Zander,et al. A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification , 2006, CCRV.
[14] Richard Han,et al. Matthan: Drone Presence Detection by Identifying Physical Signatures in the Drone's RF Communication , 2017, MobiSys.
[15] Lingyun Yang,et al. Internet video traffic classification using QoS features , 2016, 2016 International Conference on Computing, Networking and Communications (ICNC).
[16] Chi Zhang,et al. Automating Visual Privacy Protection Using a Smart LED , 2017, MobiCom.
[17] Andrew W. Moore,et al. A Machine Learning Approach for Efficient Traffic Classification , 2007, 2007 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.
[18] Ben Y. Zhao,et al. Adversarial Localization against Wireless Cameras , 2018, HotMobile.
[19] Srinivasan Seshan,et al. 802.11 user fingerprinting , 2007, MobiCom '07.
[20] Nils Ole Tippenhauer,et al. IoTScanner: Detecting Privacy Threats in IoT Neighborhoods , 2017, IoTPTS@AsiaCCS.