[HTML][HTML] Object detection under the lens of privacy: A critical survey of methods, challenges, and future directions
This paper presents critical surveillance system functions and considers advances and
challenges for privacy and ethical implications. We examine privacy-protection strategies …
challenges for privacy and ethical implications. We examine privacy-protection strategies …
Masterkey: Practical backdoor attack against speaker verification systems
Speaker Verification (SV) is widely deployed in mobile systems to authenticate legitimate
users by using their voice traits. In this work, we propose a backdoor attack MasterKey, to …
users by using their voice traits. In this work, we propose a backdoor attack MasterKey, to …
Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel
Recently, in-display fingerprint sensors have been widely adopted in newly-released
smartphones. However, we find this new technique can leak information about the user's …
smartphones. However, we find this new technique can leak information about the user's …
Survey of Side-Channel Vulnerabilities for Short-Range Wireless Communication Technologies
S Beck, M Raavi, C Dale, K Weishalla… - … Conference on Electro …, 2024 - ieeexplore.ieee.org
Short-range wireless communications have become a part of everyday human life and
protecting the security and privacy of user data is the primary goal in this digital era. Multiple …
protecting the security and privacy of user data is the primary goal in this digital era. Multiple …
CP-Guard: Malicious Agent Detection and Defense in Collaborative Bird's Eye View Perception
Collaborative Perception (CP) has shown a promising technique for autonomous driving,
where multiple connected and autonomous vehicles (CAVs) share their perception …
where multiple connected and autonomous vehicles (CAVs) share their perception …
REHSense: Towards Battery-Free Wireless Sensing via Radio Frequency Energy Harvesting
Diverse Wi-Fi-based wireless applications have been proposed, ranging from daily activity
recognition to vital sign monitoring. Despite their remarkable sensing accuracy, the high …
recognition to vital sign monitoring. Despite their remarkable sensing accuracy, the high …
MagSpy: Revealing User Privacy Leakage via Magnetometer on Mobile Devices
Various characteristics of mobile applications (apps) and associated in-app services can
reveal potentially-sensitive user information; however, privacy concerns have prompted third …
reveal potentially-sensitive user information; however, privacy concerns have prompted third …
XPorter: A study of the multi-port charger security on privacy leakage and voice injection
Multi-port chargers, capable of simultaneously charging multiple mobile devices such as
smartphones, have gained immense popularity and sold millions of units in recent years …
smartphones, have gained immense popularity and sold millions of units in recent years …
Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation
Unauthorized covert voice recording presents a significant threat to privacy-sensitive
scenarios, such as confidential meetings and private conversations. Due to their …
scenarios, such as confidential meetings and private conversations. Due to their …
FLoRa+: Energy-efficient, Reliable, Beamforming-assisted, and Secure Over-the-air Firmware Update in LoRa Networks
The widespread deployment of unattended LoRa networks poses a growing need to perform
Firmware Updates Over-The-Air (FUOTA). However, the FUOTA specifications dedicated by …
Firmware Updates Over-The-Air (FUOTA). However, the FUOTA specifications dedicated by …