I can hear your alexa: Voice command fingerprinting on smart home speakers S Kennedy, H Li, C Wang, H Liu, B Wang, W Sun 2019 IEEE Conference on Communications and Network Security (CNS), 232-240, 2019 | 67 | 2019 |
Fingerprinting encrypted voice traffic on smart speakers with deep learning C Wang, S Kennedy, H Li, K Hudson, G Atluri, X Wei, W Sun, B Wang Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020 | 52 | 2020 |
Encrypted traffic analysis on smart speakers with deep learning SM Kennedy University of Cincinnati, 2019 | 3 | 2019 |
Sparser: Secure nearest neighbor search with space-filling curves S Fang, S Kennedy, C Wang, B Wang, Q Pei, X Liu IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020 | 2 | 2020 |
Overcoming Adversarial Attacks for Human-in-the-Loop Applications R McCoppin, M Kennedy, P Lukyanenko, SM Kennedy 2022 International Conference on Machine Learning, New Frontiers in …, 2022 | 1 | 2022 |
Evaluating Adversarial Robustness with Expected Viable Performance R McCoppin, C Dawson, SM Kennedy, LM Blaha arXiv preprint arXiv:2309.09928, 2023 | | 2023 |
Generating Chunks for Cognitive Architectures G Bajaj, K Pearce, S Kennedy, O Larue, A Hough, J King, C Myers, ... Proceedings of the AAAI Symposium Series 2 (1), 246-252, 2023 | | 2023 |
Implementing online strategy and change detection algorithms in cognitive models using sequential Monte Carlo sampling for use in autonomous systems M Collins, M Lee, A Hough, SM Kennedy, JM King MathPsych 2022, 2022 | | 2022 |