Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks.
Donghui DaiZhenlin AnLei YangPublished in: SP (2023)
Keyphrases
- voice and data services
- wireless networks
- wireless communication
- mobile devices
- countermeasures
- watermarking scheme
- malicious users
- malicious attacks
- network connectivity
- security protocols
- wireless channels
- traffic analysis
- cellular networks
- denial of service attacks
- multi hop
- terrorist attacks
- emotion recognition
- cryptographic protocols
- chosen plaintext
- mobile communication
- ddos attacks
- security mechanisms
- wifi
- mobile ad hoc networks
- communication technologies
- mobile networks
- digital images