Cited By
View all- Spata MMaria Russo VOrtis ABattiato S(2025)A New Pipeline for Snooping Keystroke Based on Deep Learning AlgorithmIEEE Access10.1109/ACCESS.2025.353687713(24498-24514)Online publication date: 2025
- Chen PLiu GWang HLuo BLiao XXu JKirda ELie D(2024)Poster: Acoustic Side-Channel Attack on Robot VacuumsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3691372(5027-5029)Online publication date: 2-Dec-2024
- Wang PHu JLiu CLuo JLuo BLiao XXu JKirda ELie D(2024)RefleXnoop: Passwords Snooping on NLoS Laptops Leveraging Screen-Induced Sound ReflectionProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670341(3361-3375)Online publication date: 2-Dec-2024
- Show More Cited By