Inaudible Voice Commands: The Long-Range Attack and Defense.
Nirupam RoySheng ShenHaitham HassaniehRomit Roy ChoudhuryPublished in: NSDI (2018)
Keyphrases
- long range
- defense mechanisms
- short range
- ddos attacks
- network security
- long range interactions
- conditional random fields
- countermeasures
- long range correlations
- intrusion detection
- cyber attacks
- fractional brownian motion
- advanced research projects agency
- training data
- computer networks
- computer vision
- anomaly detection
- figure ground