369 results on '"Nitesh Saxena"'
Search Results
2. Dual Study of Canvas Fingerprinting Based Authentication: A Novel Spoofing Attack and the Countermeasure.
3. Automating Key Fingerprint Comparisons in Secure Mobile Messaging Apps: A Case Study of Signal.
4. Opted Out, Yet Tracked: Are Regulations Enough to Protect Your Privacy?
5. Sound-based Two-factor Authentication: Vulnerabilities and Redesign.
6. When AI Defeats Password Deception! A Deep Learning Framework to Distinguish Passwords and Honeywords.
7. Is On-Device AI Broken and Exploitable? Assessing the Trust and Ethics in Small Language Models.
8. Breaking Indistinguishability with Transfer Learning: A First Look at SPECK32/64 Lightweight Block Ciphers.
9. Privacy and Security of Women's Reproductive Health Apps in a Changing Legal Landscape.
10. Increasing Automotive Electrical Equipment Effectiveness with Enhanced Iron Loss Estimation Techniques.
11. Speaker Anonymity and Voice Conversion Vulnerability: A Speaker Recognition Analysis.
12. Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual World are Visible to All!
13. Breaking Mobile Notification-based Authentication with Concurrent Attacks Outside of Mobile Devices.
14. Privacy Leakage via Unrestricted Motion-Position Sensors in the Age of Virtual Reality: A Study of Snooping Typed Input on Virtual Keyboards.
15. EmoLeak: Smartphone Motions Reveal Emotions.
16. Ballot Tabulation Using Deep Learning.
17. FaceReader: Unobtrusively Mining Vital Signs and Vital Sign Embedded Sensitive Info via AR/VR Motion Sensors.
18. SoK: A Comprehensive Evaluation of 2FA-based Schemes in the Face of Active Concurrent Attacks from User Terminal.
19. BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers.
20. SoK: An Analysis of End-to-End Encryption and Authentication Ceremonies in Secure Messaging Systems.
21. Passive Vital Sign Monitoring via Facial Vibrations Leveraging AR/VR Headsets.
22. A Survey of Threats to Research Literature-dependent Medical AI Solutions.
23. Mobile Mental Health Apps: Alternative Intervention or Intrusion?
24. Human Brains Can't Detect Fake News: A Neuro-Cognitive Study of Textual Disinformation Susceptibility.
25. Beware of Your Vibrating Devices! Vibrational Relay Attacks on Zero-Effort Deauthentication.
26. Gummy Browsers: Targeted Browser Spoofing Against State-of-the-Art Fingerprinting Techniques.
27. Laser Meager Listener: A Scientific Exploration of Laser-based Speech Eavesdropping in Commercial User Space.
28. Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems.
29. Defending against Thru-barrier Stealthy Voice Attacks via Cross-Domain Sensing on Phoneme Sounds.
30. SoK: Your Mind Tells a Lot About You: On the Privacy Leakage via Brainwave Devices.
31. BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition.
32. Hearing Check Failed: Using Laser Vibrometry to Analyze the Potential for Hard Disk Drives to Eavesdrop Speech Vibrations.
33. Poster: Unobtrusively Mining Vital Sign and Embedded Sensitive Info via AR/VR Motion Sensors.
34. Enabling Finger-Touch-Based Mobile User Authentication via Physical Vibrations on IoT Devices.
35. VOICE-ZEUS: Impersonating Zoom's E2EE-Protected Static Media and Textual Communications via Simple Voice Manipulations.
36. Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems.
37. Countering Concurrent Login Attacks in 'Just Tap' Push-based Authentication: A Redesign and Usability Evaluations.
38. Press @$@$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures.
39. Face-Mic: inferring live speech and speaker identity via subtle facial dynamics captured by AR/VR motion sensors.
40. Evaluating the Effectiveness of Protection Jamming Devices in Mitigating Smart Speaker Eavesdropping Attacks Using Gaussian White Noise.
41. Analyzing the Security of OTP 2FA in the Face of Malicious Terminals.
42. A hidden-password online password manager.
43. SoK: assessing the threat potential of vibration-based attacks against live speech using mobile sensors.
44. Spearphone: a lightweight speech privacy exploit via accelerometer-sensed reverberations from smartphone loudspeakers.
45. EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech.
46. HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks.
47. Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications.
48. Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks.
49. WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training.
50. IvoriWatch: Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.