共 99 条
[41]
Sikder A K, Aksu H, Uluagac A S., 6thSense: A context-aware sensor-based attack detector for smart devices, Proc of the 26th USENIX Conf on Security Symp, pp. 397-414, (2017)
[42]
Tukur Y M, Ali Y S., Demonstrating the effect of insider attacks on perception layer of Internet of things (IoT) systems, Proc of the 15th Int Conf on Electronics, Computer and Computation (ICECCO), pp. 1-6, (2019)
[43]
Tippenhauer N O, Popper C, Rasmussen K B, Et al., On the requirements for successful GPS spoofing attacks, Proc of the 18th ACM Conf on Computer and Communications Security (CCS), pp. 75-86, (2011)
[44]
Park Y, Son Y, Shin H, Et al., This ain't your dose: Sensor spoofing attack on medical infusion pump[C/OL], Proc of the 10th USENIX Workshop on Offensive Technologies (WOOT), (2016)
[45]
Marasco E, Ross A., A survey on antispoofing schemes for fingerprint recognition systems, ACM Computing Surveys, 47, 2, pp. 1-36, (2014)
[46]
Wu Zhizheng, Evans N, Kinnunen T, Et al., Spoofing and countermeasures for speaker verification: A survey, Speech Communication, 66, pp. 130-153, (2015)
[47]
Sahidullah M, Delgado H, Todisco M, Et al., Introduction to voice presentation attack detection and recent advances, Handbook of Biometric Anti-spoofing, pp. 321-361, (2015)
[48]
Zhang Guoming, Yan Chen, Ji Xiaoyu, Et al., DolphinAttack: Inaudible voice commands, Proc of the 2017 ACM Conf on Computer and Communications Security (SIGSAC), pp. 103-117, (2017)
[49]
Son Y, Shin H, Kim D, Et al., Rocking drones with intentional sound noise on gyroscopic sensors, Proc of the 24th USENIX Conf on Security Symp, pp. 881-896, (2015)
[50]
Kumar D, Shen K, Case B, Et al., All things considered: An analysis of IoT devices on home networks, Proc of the 28th USENIX Conf on Security Symp, pp. 1169-1185, (2019)