Login / Signup

Compromised Computers Meet Voice Assistants: Stealthily Exfiltrating Data as Voice over Telephony.

Zhengxian HeMohit Narayan RajputMustaque Ahamad
Published in: DSN (2021)
Keyphrases