827 results on '"LI Lu"'
Search Results
2. mmEar: Push the Limit of COTS mmWave Eavesdropping on Headphones.
3. Conan's Bow Tie: A Streaming Voice Conversion for Real-Time VTuber Livestreaming.
4. Space Radiation Flux Driven Fault Injection for Evaluating Dynamic Mitigation Strategies.
5. Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection.
6. MicGuard: A Comprehensive Detection System against Out-of-band Injection Attacks for Different Level Microphone-based Devices.
7. Devil in the Room: Triggering Audio Backdoors in the Physical World.
8. FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition.
9. Towards SEU Fault Propagation Prediction with Spatio-Temporal Graph Convolutional Networks.
10. CFNet: Point Cloud Upsampling via Cascaded Feedback Network.
11. PULP Fiction No More - Dependable PULP Systems for Space.
12. FingerFaker: Spoofing Attack on COTS Fingerprint Recognition Without Victim's Knowledge.
13. LEGO: Empowering Chip-Level Functionality Plug-and-Play for Next-Generation IoT Devices.
14. J-ToneNet: A Transformer-based Encoding Network for Improving Tone Classification in Continuous Speech via F0 Sequences.
15. Model-assisted Lexical Tone Evaluation of three-year-old Chinese-speaking Children by also Considering Segment Production.
16. Large Class Separation is Not What You Need for Relational Reasoning-Based OOD Detection.
17. Adaptive Lock-Step System for Resilient Multiprocessing Architectures.
18. Transferring Audio Deepfake Detection Capability across Languages.
19. Public Bicycle Flow Forecasting using Spatial and Temporal Graph Neural Network.
20. MLNet: Enhancing Joint Predictive Modeling of Chronic Diseases Using Deep Learning.
21. CARE-30: A Causally Driven Multi-Modal Model for Enhanced 30-Day ICU Readmission Predictions.
22. Bits, Flips and RISCs.
23. Go Beyond RFID: Rethinking the Design of RFID Sensor Tags for Versatile Applications.
24. MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.
25. μMote: Enabling Passive Chirp De-spreading and μW-level Long-Range Downlink for Backscatter Devices.
26. Study on the Effect of Virtual Landscape on Stress Relief of College Students.
27. Shift to Your Device: Data Augmentation for Device-Independent Speaker Verification Anti-Spoofing.
28. WeSinger 2: Fully Parallel Singing Voice Synthesis via Multi-Singer Conditional Adversarial Training.
29. Minimising Distortion for GAN-Based Facial Attribute Manipulation.
30. Regression-based Sound Event Detection with Semi-supervised Learning.
31. A Lightweight Speaker Verification Model For Edge Device.
32. FITS: Matching Camera Fingerprints Subject to Software Noise Pollution.
33. Swin-MMC: Swin-Based Model for Myopic Maculopathy Classification in Fundus Images.
34. FAU-Gaze: Fast and Accurate User-specific Gaze Estimation Framework.
35. BypTalker: An Adaptive Adversarial Example Attack to Bypass Prefilter-enabled Speaker Recognition.
36. Frequency Hopping Acquisition Based on Variable Forgetting Factor Recursive Least Squares Algorithm.
37. RDGFuzz: A directed greybox fuzzing optimization method based on Rich-Branch nodes.
38. Low-Level Graph Convolution Network for Point Cloud Processing.
39. Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain.
40. Realizing Power-efficient Encryption Communication for Computational RFID Tags.
41. WeSinger: Data-augmented Singing Voice Synthesis with Auxiliary Losses.
42. Online ECG Emotion Recognition for Unknown Subjects via Hypergraph-Based Transfer Learning.
43. Cross-session Specific Emitter Identification using Adversarial Domain Adaptation with Wasserstein distance.
44. ICPR 2022 Challenge on Multi-Modal Subtitle Recognition.
45. ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures.
46. Passive DSSS: Empowering the Downlink Communication for Backscatter Systems.
47. Big Brother is Listening: An Evaluation Framework on Ultrasonic Microphone Jammers.
48. mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric Effect.
49. Push the Limit of WiFi-based User Authentication towards Undefined Gestures.
50. PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.