Sign in

EchoAttack: Practical Inaudible Attacks To Smart Earbuds.

Gen LiZhichao CaoTianxing Li
Published in: MobiSys (2023)
Keyphrases
  • countermeasures
  • real world
  • malicious attacks
  • information systems
  • cooperative
  • wireless sensor networks
  • digital images
  • practical application
  • security mechanisms
  • watermarking technique