The threat of offensive ai to organizations

Y Mirsky, A Demontis, J Kotak, R Shankar, D Gelei… - Computers & …, 2023 - Elsevier
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …

Commodity WiFi sensing in ten years: Status, challenges, and opportunities

S Tan, Y Ren, J Yang, Y Chen - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
The prevalence of WiFi devices and ubiquitous coverage of WiFi networks provide us the
opportunity to extend WiFi capabilities beyond communication, particularly in sensing the …

Device-free gesture tracking using acoustic signals

W Wang, AX Liu, K Sun - Proceedings of the 22nd Annual International …, 2016 - dl.acm.org
Device-free gesture tracking is an enabling HCI mechanism for small wearable devices
because fingers are too big to control the GUI elements on such small screens, and it is also …

Fingerio: Using active sonar for fine-grained finger tracking

R Nandakumar, V Iyer, D Tan, S Gollakota - Proceedings of the 2016 …, 2016 - dl.acm.org
We present fingerIO, a novel fine-grained finger tracking solution for around-device
interaction. FingerIO does not require instrumenting the finger with sensors and works even …

Hearing your voice is not enough: An articulatory gesture based liveness detection for voice authentication

L Zhang, S Tan, J Yang - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
Voice biometrics is drawing increasing attention as it is a promising alternative to legacy
passwords for mobile authentication. Recently, a growing body of work shows that voice …

Personal voice assistant security and privacy—a survey

P Cheng, U Roedig - Proceedings of the IEEE, 2022 - ieeexplore.ieee.org
Personal voice assistants (PVAs) are increasingly used as interfaces to digital environments.
Voice commands are used to interact with phones, smart homes, or cars. In the United …

An indirect eavesdrop** attack of keystrokes on touch screen through acoustic sensing

J Yu, L Lu, Y Chen, Y Zhu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper demonstrates the feasibility of a side-channel attack to infer keystrokes on touch
screen leveraging an off-the-shelf smartphone. Although there exist some studies on …

mmVib: micrometer-level vibration measurement with mmwave radar

C Jiang, J Guo, Y He, M **, S Li, Y Liu - Proceedings of the 26th Annual …, 2020 - dl.acm.org
Vibration measurement is a crucial task in industrial systems, where vibration characteristics
reflect the health and indicate anomalies of the objects. Previous approaches either work in …

Voicelive: A phoneme localization based liveness detection for voice authentication on smartphones

L Zhang, S Tan, J Yang, Y Chen - … of the 2016 ACM SIGSAC Conference …, 2016 - dl.acm.org
Voice authentication is drawing increasing attention and becomes an attractive alternative to
passwords for mobile authentication. Recent advances in mobile technology further …

When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals

M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu… - Proceedings of the 2016 …, 2016 - dl.acm.org
In this study, we present WindTalker, a novel and practical keystroke inference framework
that allows an attacker to infer the sensitive keystrokes on a mobile device through WiFi …