关注
Yosef Solewicz
Yosef Solewicz
Jerusalem College of Technology
在 alumni.technion.ac.il 的电子邮件经过验证
标题
引用次数
引用次数
年份
Acoustic data exfiltration from speakerless air-gapped computers via covert hard-drive noise (‘diskfiltration’)
M Guri, Y Solewicz, A Daidakulov, Y Elovici
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
1032017
Freqüência de ocorrência dos fones e listas de frases foneticamente balanceadas no português falado no Rio de Janeiro
A Alcaim, JA Solewicz, JA de Moraes
Journal of Communication and Information Systems 7 (1), 1992
991992
Fansmitter: Acoustic data exfiltration from (speakerless) air-gapped computers
M Guri, Y Solewicz, A Daidakulov, Y Elovici
arXiv preprint arXiv:1606.05915, 2016
852016
Digital Audio Signature for 3D Printing Integrity
YE Sofia Belikovetsky, Yosef Solewicz, Mark Yampolskiy, Jinghui Toh
IEEE Transactions on Information Forensics and Security, 2018
772018
MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication
G Mordechai, S Yosef, D Andrey, Y Elovici
arXiv, 2018
75*2018
MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication
YE Mordechai Guri, Yosef Soelwicz, Andrey Daidakulov
arXiv:1803.03422, 2018
75*2018
MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication
YE Mordechai Guri, Yosef Solewicz, Andrey Daidakulov
arXiv:1803.03422, 2018
75*2018
Detecting sabotage attacks in additive manufacturing using actuator power signatures
J Gatlin, S Belikovetsky, SB Moore, Y Solewicz, Y Elovici, M Yampolskiy
IEEE Access 7, 133421-133432, 2019
472019
Fansmitter: Acoustic data exfiltration from air-gapped computers via fans noise
M Guri, Y Solewicz, Y Elovici
Computers & Security 91, 101721, 2020
432020
{SPEAKE (a) R}: Turn Speakers to Microphones for Fun and Profit
M Guri, Y Solewicz, A Daidakulov, Y Elovici
11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017
352017
Detecting cyber-physical attacks in additive manufacturing using digital audio signing
S Belikovetsky, Y Solewicz, M Yampolskiy, J Toh, Y Elovici
arXiv preprint arXiv:1705.06454, 2017
332017
Diskfiltration: Data exfiltration from speakerless air-gapped computers via covert hard drive noise
M Guri, Y Solewicz, A Daidakulov, Y Elovici
arXiv preprint arXiv:1608.03431, 2016
272016
Two-wire nuisance attribute projection
YA Solewicz, H Aronowitz
Tenth Annual Conference of the International Speech Communication Association, 2009
202009
Evaluation of Phonexia automatic speaker recognition software under conditions reflecting those of a real forensic voice comparison case (forensic_eval_01)
M Jessen, J Bortlík, P Schwarz, YA Solewicz
Speech Communication 111, 22-28, 2019
182019
Speaker-to-speaker covert ultrasonic communication
M Guri, Y Solewicz, Y Elovici
Journal of Information Security and Applications 51, 102458, 2020
152020
Firearms identification by the acoustic signals of their mechanisms
P Giverts, S Sofer, Y Solewicz, B Varer
Forensic science international 306, 110099, 2020
152020
Null-Hypothesis LLR: A proposal for Forensic Automatic Speaker Recognition
Y Solewicz, M Jessen, D van der Vloed
Interspeech, 2017
152017
Using post-classifiers to enhance fusion of low-and high-level speaker recognition
YA Solewicz, M Koppel
IEEE Transactions on Audio, Speech, and Language Processing 15 (7), 2063-2071, 2007
152007
Speaker recognition in two-wire test sessions.
H Aronowitz, YA Solewicz
INTERSPEECH, 865-868, 2008
142008
Considering speech quality in speaker verification fusion.
YA Solewicz, M Koppel
INTERSPEECH, 2189-2192, 2005
132005
系统目前无法执行此操作,请稍后再试。
文章 1–20