ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1407.0803
  4. Cited By
Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy
  with Inaudible Sound

Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound

Conference on Computer and Communications Security (CCS), 2014
3 July 2014
Zhe Zhou
Wenrui Diao
Xiangyu Liu
Kehuan Zhang
ArXiv (abs)PDFHTML

Papers citing "Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthy with Inaudible Sound"

8 / 8 papers shown
Browser Fingerprinting Using WebAssembly
Browser Fingerprinting Using WebAssembly
Mordechai Guri
Dor Fibert
212
0
0
31 May 2025
SoK: Acoustic Side Channels
SoK: Acoustic Side Channels
Ping Wang
Shishir Nagaraja
A. Bourquard
Haichang Gao
Jeff Yan
164
5
0
06 Aug 2023
DRAWNAPART: A Device Identification Technique based on Remote GPU
  Fingerprinting
DRAWNAPART: A Device Identification Technique based on Remote GPU FingerprintingNetwork and Distributed System Security Symposium (NDSS), 2022
Tomer Laor
Naif Mehanna
Antonin Durey
Vitaly Dyadyuk
Pierre Laperdrix
Clémentine Maurice
Yossi Oren
Romain Rouvoy
Walter Rudametkin
U. Adelaide
MLAU
150
40
0
24 Jan 2022
Estimating Uniqueness of I-Vector Representation of Human Voice
Estimating Uniqueness of I-Vector Representation of Human Voice
Erkam Sinan Tandogan
Husrev Taha Sencar
114
0
0
27 Aug 2020
Who Is Charging My Phone? Identifying Wireless Chargers via FingerprintingIEEE Internet of Things Journal (IEEE IoT J.), 2020
Zhiyun Wang
Jiayu Zhang
Xiaoyu Ji
Wei Dong
Gang Qu
Minjian Zhao
203
8
0
30 Jul 2020
Systematic Classification of Side-Channel Attacks: A Case Study for
  Mobile Devices
Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices
Raphael Spreitzer
Veelasha Moonsamy
Thomas Korak
Stefan Mangard
AAML
344
250
0
11 Nov 2016
Exploring Ways To Mitigate Sensor-Based Smartphone Fingerprinting
Exploring Ways To Mitigate Sensor-Based Smartphone Fingerprinting
Anupam Das
Nikita Borisov
M. Caesar
223
37
0
06 Mar 2015
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information
  and Control Your Phone
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone
Wenrui Diao
Xiangyu Liu
Zhe Zhou
Kehuan Zhang
169
160
0
18 Jul 2014
1
Page 1 of 1