Login / Signup

Implement of a secure selective ultrasonic microphone jammer.

Yike ChenMing GaoYajie LiuJianwei LiuXian XuLe ChengJinsong Han
Published in: CCF Trans. Pervasive Comput. Interact. (2021)
Keyphrases
  • security measures
  • security issues
  • security requirements
  • data sets
  • database
  • data mining
  • lightweight
  • non stationary
  • visual information
  • security mechanisms
  • authentication scheme