Login / Signup
When Good Turns Evil: Encrypted 5G/4G Voice Calls Can Leak Your Identities.
Jingwen Shi
Tian Xie
Guan-Hua Tu
Chunyi Peng
Chi-Yu Li
Andrew Z. Hou
Sihan Wang
Yiwen Hu
Xinyu Lei
Min-Yue Chen
Li Xiao
Xiaoming Liu
Published in:
CNS (2023)
Keyphrases
</>
information flow
decision making
databases
neural network
information systems
data structure
text to speech
database
emotion recognition
behavioral patterns
voice recognition