Life after speech recognition: Fuzzing semantic misinterpretation for voice assistant applications Y Zhang, L Xu, A Mendoza, G Yang, P Chinprutthiwong, G Gu Proc. of the Network and Distributed System Security Symposium (NDSS'19), 2019 | 68 | 2019 |
Towards fine-grained network security forensics and diagnosis in the sdn era H Wang, G Yang, P Chinprutthiwong, L Xu, Y Zhang, G Gu Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 49 | 2018 |
The service worker hiding in your browser: The next web attack target? P Chinprutthiwong, R Vardhan, GL Yang, Y Zhang, G Gu Proceedings of the 24th International Symposium on Research in Attacks …, 2021 | 6 | 2021 |
Practical Speech Re-use Prevention in Voice-driven Services Y Zhang, M Shirvanian, SS Arora, J Huang, G Gu 24th International Symposium on Research in Attacks, Intrusions and Defenses, 2021 | 3 | 2021 |
# DM-Me: Susceptibility to Direct Messaging-Based Scams R Vardhan, A Chandrawal, P Chinprutthiwong, Y Zhang, G Gu Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023 | | 2023 |
Do Users Really Know Alexa? Understanding Alexa Skill Security Indicators Y Zhang, R Vardhan, P Chinprutthiwong, G Gu Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023 | | 2023 |
Acoustic signatures for voice-enabled computer systems Y Zhang, M Salajegheh, M Shirvanian, S Singh Arora US Patent US20220270618A1, 2022 | | 2022 |
Utilizing an NG 9-1-1 Test Lab to Validate Standards Compliance WR Magnussen, P Wang, Y Zhang IEEE Communications Magazine 55 (1), 146-151, 2017 | | 2017 |