Obserwuj
Yuxuan Chen
Yuxuan Chen
Zweryfikowany adres z sdu.edu.cn - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
X Yuan, Y Chen, Y Zhao, Y Long, X Liu, K Chen, S Zhang, H Huang, ...
USENIX Security 2018, 2018
1852018
{Devil’s} Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices
Y Chen, X Yuan, J Zhang, Y Zhao, S Zhang, K Chen, XF Wang
29th USENIX Security Symposium (USENIX Security 20), 2667-2684, 2020
712020
All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo
X Yuan, Y Chen, A Wang, K Chen, S Zhang, H Huang, I Molloy
IEEE Global Communications Conference 2018, 2018
262018
Research on cost-optimal algorithm of multi-QoS constraints for task scheduling in hybrid-cloud
Y Liu, C Li, Z Yang, Y Chen, L Xu
J. Softw. Eng 9 (1), 33-49, 2015
62015
Sok: A modularized approach to study the security of automatic speech recognition systems
Y Chen, J Zhang, X Yuan, S Zhang, K Chen, X Wang, S Guo
ACM Transactions on Privacy and Security 25 (3), 1-31, 2022
52022
Adversarial Attacks Against Deep Learning-Based Speech Recognition Systems
X Yuan, Y Chen, K Chen, S Zhang, XF Wang
Cyber Security Meets Machine Learning, 99-127, 2021
2021
Manipulating Users’ Trust on Amazon Echo: Compromising Smart Home from Outside
Y Chen, X Yuan, A Wang, K Chen, S Zhang, H Huang
EAI Endorsed Transactions on Security and Safety 6 (22), 2020
2020
Performance Guarantee Mechanism for Multi-Tenancy SaaS Service Based on Kalman Filtering
L Yanpei, L Chunlin, Y Zhiyong, C Yuxuan, X Lijun
Cybernetics and Information Technologies 15 (3), 150-164, 2015
2015
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–8