1:20 [Paper Teaser] Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones ACM WiSec 12.6K views - 3 years ago
1:30 Teaser: Fingerprinting Encrypted Voice Traffic on Smart Speakers with Deep Learning ACM WiSec 337 views - 5 years ago
5:10 Extracting Physical-Layer BLE Advertisement Information from Broadcom and Cypress Chips ACM WiSec 127 views - 5 years ago
1:21 [Paper Teaser] Angularly Dispersive Terahertz Links with Secure Coding from Theoretical Foundatio... ACM WiSec 80 views - 3 years ago
3:17 Venom: a Visual and Experimental Bluetooth Low Energy Tracking System ACM WiSec 134 views - 5 years ago
2:01 [Demo] openwifi CSI fuzzer for authorized sensing and covert channels ACM WiSec 375 views - 4 years ago
8:30 Evolving Journal AI Policies | Sara Kate Heukerott (ACM) | Peer Wise Video InsightsVideo 3 V03 KnowledgeWorks Global Ltd. 39 views - 7 months ago
2:01 [Demo] OpenHaystack: a framework for tracking personal bluetooth devices via Apple's find my network ACM WiSec 1.8K views - 4 years ago
17:26 Owfuzz: Discovering Wi-Fi Flaws in Modern Devices through Over-The-Air Fuzzing ACM WiSec 283 views - 2 years ago
3:38 CACM Jan. 2019 - Face2Face Real Time Face Capture and Reenactment of RGB Videos Association for Computing Machinery (ACM) 9.4K views - 7 years ago
19:15 SoK: A Comprehensive Evaluation of 2FA-based Schemes in the Face of Active Concurrent Attacks from… ACM WiSec 48 views - 2 years ago