Seguir
Yi Xu
Título
Citado por
Citado por
Ano
Seeing double: Reconstructing obscured typed input from repeated compromising reflections
Y Xu, J Heinly, AM White, F Monrose, JM Frahm
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1062013
Virtual u: Defeating face liveness detection by building virtual models from your public photos
Y Xu, T Price, JM Frahm, F Monrose
25th USENIX Security Symposium (USENIX Security 16), 497-512, 2016
1002016
Security and Usability Challenges of {Moving-Object}{CAPTCHAs}: Decoding Codewords in Motion
Y Xu, G Reynaga, S Chiasson, JM Frahm, F Monrose, P Van Oorschot
21st USENIX Security Symposium (USENIX Security 12), 49-64, 2012
742012
Security analysis and related usability of motion-based captchas: Decoding codewords in motion
Y Xu, G Reynaga, S Chiasson, JM Frahm, F Monrose, PC Van Oorschot
IEEE transactions on dependable and secure computing 11 (5), 480-493, 2013
392013
Watching the watchers: Automatically inferring tv content from outdoor light effusions
Y Xu, JM Frahm, F Monrose
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
372014
On the privacy risks of virtual keyboards: Automatic reconstruction of typed input from compromising reflections
R Raguram, AM White, Y Xu, JM Frahm, P Georgel, F Monrose
IEEE Transactions on Dependable and Secure Computing 10 (3), 154-167, 2013
192013
True Price, Jan-Michael Frahm, and Fabian Monrose. 2016. Virtual U: Defeating face liveness detection by building virtual models from your public photos
Y Xu
25th USENIX Security Symposium (USENIX Security 16). USENIX Association …, 0
18
ROME: Rateless online MDS code for wireless data broadcasting
N He, Y Xu, J Cao, Z Li, H Chen, Y Ren
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
102010
Caught Red-Handed: Toward Practical Video-Based Subsequences Matching in the Presence of Real-World Transformations.
Y Xu, T Price, F Monrose, JM Frahm
CVPR Workshops, 1397-1406, 2017
62017
Toward robust video event detection and retrieval under adversarial constraints
Y Xu
The University of North Carolina at Chapel Hill, 2016
2016
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–10