Xu, Wenyuan
1715  Ergebnisse:
Personensuche X
?
1

Analyzing and Defending GhostTouch Attack against Capacitiv..:

Wang, Kai ; Mitev, Richard ; Yan, Chen...
IEEE Transactions on Dependable and Secure Computing.  , 2024
 
?
2

Toward Pitch-Insensitive Speaker Verification via Soundfiel:

Li, Xinfeng ; Zheng, Zhicong ; Yan, Chen...
IEEE Internet of Things Journal.  11 (2024)  1 - p. 1175-1189 , 2024
 
?
3

Ultrasound Communication Using the Nonlinearity Effect of M..:

Zhang, Guoming ; Ji, Xiaoyu ; Zhou, Xinyan..
ACM Transactions on Sensor Networks.  20 (2024)  3 - p. 1-22 , 2024
 
?
4

Scoring Metrics of Assessing Voiceprint Distinctiveness Bas..:

He, Ruiwen ; Cheng, Yushi ; Ze, Junning...
IEEE Transactions on Dependable and Secure Computing.  , 2024
 
?
7

Evaluating Compressive Sensing on the Security of Computer ..:

Cheng, Yushi ; Zhou, Boyang ; Chen, Yanjiao...
ACM Transactions on Sensor Networks.  20 (2024)  3 - p. 1-24 , 2024
 
?
8

Dr. Defender: Proactive Detection of Autopilot Drones Based..:

Deng, Jiangyi ; Ji, Xiaoyu ; Wang, Beibei..
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 194-206 , 2024
 
?
11

Unity is Strength? Benchmarking the Robustness of Fusion-ba..:

, In: Proceedings of the ACM on Web Conference 2024,
Jin, Zizhi ; Lu, Xuancun ; Yang, Bo... - p. 3031-3042 , 2024
 
?
12

Mechanical damage mechanism investigation on CFRP strengthe..:

Ji, Yongcheng ; Li, Zheng ; Xu, Wenyuan.
REVIEWS ON ADVANCED MATERIALS SCIENCE.  63 (2024)  1 - p. , 2024
 
?
 
?
14

MagView++: Data Exfiltration via CPU Magnetic Signals Under..:

Ji, Xiaoyu ; Zhang, Juchuan ; Zou, Shan...
IEEE Transactions on Mobile Computing.  23 (2024)  3 - p. 2486-2503 , 2024
 
?
15

Detecting Inaudible Voice Commands via Acoustic Attenuation..:

Ji, Xiaoyu ; Zhang, Guoming ; Li, Xinfeng...
IEEE Transactions on Dependable and Secure Computing.  , 2024
 
1-15