关注
Chenggang Wang
Chenggang Wang
在 aum.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers
S Kennedy, H Li, C Wang, H Liu, B Wang, W Sun
2019 IEEE Conference on Communications and Network Security (CNS), 232-240, 2019
662019
A DCNN based fingerprint liveness detection algorithm with voting strategy
C Wang, K Li, Z Wu, Q Zhao
Biometric Recognition: 10th Chinese Conference, CCBR 2015, Tianjin, China …, 2015
652015
Fingerprinting encrypted voice traffic on smart speakers with deep learning
C Wang, S Kennedy, H Li, K Hudson, G Atluri, X Wei, W Sun, B Wang
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020
522020
Adaptive Fingerprinting: Website Fingerprinting over Few Encrypted Traffic
C Wang, J Dani, X Li, X Jia, B Wang
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
322021
RadioNet: Robust Deep-Learning Based Radio Fingerprinting
H Li, K Gupta, C Wang, N Ghose, B Wang
2022 IEEE Conference on Communications and Network Security (CNS), 190-198, 2022
122022
TripletPower: Deep-Learning Side-Channel Attacks over Few Traces
C Wang, J Dani, S Reilly, A Brownfield, B Wang, JM Emmert
2023 IEEE International Symposium on Hardware Oriented Security and Trust …, 2023
42023
EcoBoost: Efficient Bootstrapping for Confidential Transactions
C Wang, B Wang, X Fan
2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1-3, 2020
32020
Robust deep-learning-based radio fingerprinting with fine-tuning
H Li, C Wang, N Ghose, B Wang
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021
22021
POSTER: Robust Deep-learning-based Radio Fingerprinting with Fine-Tuning
H Li, C Wang, N Ghose, B Wang
Proc. ACM WiSec 21, 2021
22021
Sparser: Secure Nearest Neighbor Search with Space-filling Curves
S Fang, S Kennedy, C Wang, B Wang, Q Pei, X Liu
IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020
22020
Portability of Deep-Learning Side-Channel Attacks against Software Discrepancies
C Wang, M Ninan, S Reilly, J Ward, W Hawkins, B Wang, JM Emmert
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless …, 2023
12023
Towards Robust Side-Channel Attacks With Machine Learning
C Wang
University of Cincinnati, 2022
2022
基于奇异点的字典模型指纹方向场去噪方法.
王成钢, 赵启军, 吴志红
Application Research of Computers/Jisuanji Yingyong Yanjiu 33 (5), 2016
2016
系统目前无法执行此操作,请稍后再试。
文章 1–13