Zobrazeno 1 - 10
of 60
pro vyhledávání: '"Jeff Yan"'
Publikováno v:
PLoS ONE, Vol 11, Iss 7, p e0157838 (2016)
Evolutionary psychology suggests that men are more likely than women to deceive to bolster their status and influence. Also gender perception influences deceptive behavior, which is linked to pervasive gender stereotypes: women are typically viewed a
Externí odkaz:
https://doaj.org/article/9dab2479c2ef4a5c88769db164f3f803
Publikováno v:
The Electronic Library, 2002, Vol. 20, Issue 2, pp. 125-133.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/02640470210424455
Publikováno v:
IEEE Symposium on Security and Privacy Workshops
Lancaster University-Pure
Lancaster University-Pure
Personal Voice Assistants (PVAs) such as the Siri, Amazon Echo and Google Home are now commonplace. PVAs continuously monitor conversations which may be transported to a cloud back end where they are stored, processed and maybe even passed on to othe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::394851113bd607c340e83bbbdddada11
https://hdl.handle.net/10468/8396
https://hdl.handle.net/10468/8396
Publikováno v:
Lancaster University-Pure
MPS@CCS
MPS@CCS
Personal Voice Assistants (PVAs) such as the Amazon Echo are commonplace and it is now likely to always be in range of at least one PVA. Although the devices are very helpful they are also continuously monitoring conversations. When a PVA detects a w
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::52dd65198ce82f7d48ae54bd2d8d5c5c
https://strathprints.strath.ac.uk/79624/1/Cheng_etal_MPS2018_Towards_reactive_acoustic_jamming_for_personal_voice_assistants.pdf
https://strathprints.strath.ac.uk/79624/1/Cheng_etal_MPS2018_Towards_reactive_acoustic_jamming_for_personal_voice_assistants.pdf
We report the first active acoustic side-channel attack. Speakers are used to emit human inaudible acoustic signals, and the echo is recorded via microphones, turning the acoustic system of a smart phone into a sonar system. The echo signal can be us
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0cb3e78eadc199566c1ad3d6962abd07
http://arxiv.org/abs/1808.10250
http://arxiv.org/abs/1808.10250
Autor:
Jeff Yan
Publikováno v:
Security Protocols XXVI ISBN: 9783030032500
Security Protocols Workshop
Security Protocols Workshop
Match fixing is an increasingly popular phenomenon in e-Sports, namely competitive computer gaming between professional players. We first revisit the notion of security for computer games in the context of match fixing, which was never considered bef
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::77d64afc47a5ca884d7e50a31dc301f4
https://doi.org/10.1007/978-3-030-03251-7_19
https://doi.org/10.1007/978-3-030-03251-7_19
Publikováno v:
NDSS
Autor:
Paul Crocker, Jeff Yan, Bill Clark, Khiem Quang Nguyen, Shane Keating, Zhichao Tan, Howard R. Samuels
Publikováno v:
A-SSCC
This paper presents a high performance dual-axis (pitch and roll) MEMS vibratory gyroscope readout ASIC which converts angular rate information to digital output. Two signal processing chains surrounding the MEMS sensor are implemented, namely the dr
Autor:
Jeff Yan, Aurelien Bourquard
Publikováno v:
CCS
We motivate a new line of image forensics, and propose a novel approach to photographer identification, a rarely explored authorship attribution problem. A preliminary proof-of-concept study shows the feasibility of our method. Our contribution is a
Autor:
Jeff Yan
Publikováno v:
Security Protocols XXIV ISBN: 9783319620329
Security Protocols Workshop
Security Protocols Workshop
I will talk about three very simple ideas about camera fingerprints. I didn’t have time to put all the details in my slides, so please feel free to ask for any clarification or any question anytime. I didn’t realize until it was too late that my
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f3c2df4a6b45990989e05e8da749a97b
https://doi.org/10.1007/978-3-319-62033-6_12
https://doi.org/10.1007/978-3-319-62033-6_12