Cited By
View all- Chillara ASaxena PMaiti RGupta MKondapalli RZhang ZKesavan K(2024)Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboardsInternational Journal of Information Security10.1007/s10207-024-00834-y23:3(2043-2061)Online publication date: 1-Jun-2024
- Dumitru RGenkin DWabnitz AYarom YCalandrino JTroncoso C(2023)The impostor among US(B)Proceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620565(5863-5880)Online publication date: 9-Aug-2023
- Khalfaoui SLeneutre JVillard AMa JUrien P(2021)Security Analysis of Out-of-Band Device Pairing ProtocolsWireless Communications & Mobile Computing10.1155/2021/88874722021Online publication date: 1-Jan-2021
- Show More Cited By