共 8 条
- [5] DolphinAttack:Inaudible voice commands. Zhang Guoming,Yan Chen,Ji Xiaoyu.et al. Proc of 2017ACM SIGSAC Conf on Computer and Communications Security . 2017
- [6] IBM watson. IBM. https://www.ibm.com/watson . 2019
- [7] Knock knock who’’s there?Membership inference on aggregate location data. Pyrgelis A,Troncoso C,De Cristofaro E. Proc of the 25th Annual Network and Distributed System Security Symp (NDSS 2018) . 2018
- [8] Skill squatting attacks on amazon alexa. Kumar D,Paccagnella R,Murley P,et al. Proc of the 27th USENIX Security Symp (USENIX Security’’18) . 2018