共 8 条
[5]
DolphinAttack:Inaudible voice commands. Zhang Guoming,Yan Chen,Ji Xiaoyu.et al. Proc of 2017ACM SIGSAC Conf on Computer and Communications Security . 2017
[6]
IBM watson. IBM. https://www.ibm.com/watson . 2019
[7]
Knock knock who’’s there?Membership inference on aggregate location data. Pyrgelis A,Troncoso C,De Cristofaro E. Proc of the 25th Annual Network and Distributed System Security Symp (NDSS 2018) . 2018
[8]
Skill squatting attacks on amazon alexa. Kumar D,Paccagnella R,Murley P,et al. Proc of the 27th USENIX Security Symp (USENIX Security’’18) . 2018