A technique to identify people's attitudes, and sentiments towards specified targets such as things, services, and subjects, is called sentiment analysis. As a dedicated subset of NLP, it deals with predicting spe...
详细信息
Phishing websites are those where a person can imitate a legitimate website and trick an innocent user into thinking he is visiting a legitimate website while stealing sensitive information. Statistics from the Anti-P...
详细信息
While deep learning excels in computer vision tasks with abundant labeled data, its performance diminishes significantly in scenarios with limited labeled samples. To address this, Few-shot learning (FSL) enables mode...
详细信息
Waste management is an increasing concern in urban areas worldwide, because of population growth and environmental sustainability goals. To address this challenge, this paper presents a Convolutional Neural Network (C...
详细信息
Our comprehensive application provides a versatile solution for managing attendance, events, and on-duty assignments within college administrative operations. Developed meticulously, our application comprises three co...
详细信息
DolphinAttacks (i.e., inaudible voice commands) modulate audible voices over ultrasounds to inject malicious commands silently into voice assistants and manipulate controlled systems (e.g., doors or smart speakers). E...
详细信息
DolphinAttacks (i.e., inaudible voice commands) modulate audible voices over ultrasounds to inject malicious commands silently into voice assistants and manipulate controlled systems (e.g., doors or smart speakers). Eliminating DolphinAttacks is challenging if ever possible since it requires to modify the microphone hardware. In this paper, we design EarArray, a lightweight method that can not only detect such attacks but also identify the direction of attackers without requiring any extra hardware or hardware modification. Essentially, inaudible voice commands are modulated on ultrasounds that inherently attenuate faster than the one of audible sounds. By inspecting the command sound signals via the built-in multiple microphones on smart devices, EarArray is able to estimate the attenuation rate and thus detect the attacks. We propose a model of the propagation of audible sounds and ultrasounds from the sound source to a voice assistant, e.g., a smart speaker, and illustrate the underlying principle and its feasibility. We implemented EarArray using two specially-designed microphone arrays and our experiments show that EarArray can detect inaudible voice commands with an accuracy of above 99% and recognize the direction of the attackers with an accuracy of 97.89% and can also detect the laser-based attack with an accuracy of 100%. IEEE
Due to the rise in crime, it is harder for police to identify criminals in public. Constantly reviewing surveillance footage is a laborious process that requires careful attention to detail and is not cognitively stim...
详细信息
The escalating reliance of computer networks on security systems exposes them to increasing threats. In response, an advanced security system is proposed, utilizing machine learning and deep learning techniques and le...
详细信息
The innovative city network integrates numerous computational and physical components to develop real-time systems. These systems can capture sensor data and distribute it to end stations. Most solutions have been pre...
详细信息
Fifth-generation communication technology enables advanced indoor positioning with its high bandwidth and frequency capabilities. However, indoor environment variability causes signal propagation fluctuations, making ...
详细信息
暂无评论