A survey of attack and defense on human-computer interaction security
With the development of technologies such as the internet of things and artificial intelligence,human-computer interaction applications are constantly being introduced.However,the development of human-computer interaction technology is also accompanied by new security issues,and human-computer inter...
Saved in:
| Main Authors: | Kaiqiang GE, Tieming CHEN |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Beijing Xintong Media Co., Ltd
2019-10-01
|
| Series: | Dianxin kexue |
| Subjects: | |
| Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2019196/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
ByteBait USB: a robust simulation toolkit for badUSB phishing campaign
by: Wenhao Li, et al.
Published: (2025-07-01) -
GreyFan:a network attack framework using Wi-Fi covert channel
by: Dongjie MA, et al.
Published: (2019-09-01) -
Research and Application of Intelligent Human-machine Interaction for Train
by: LIAO Jifang, et al.
Published: (2018-01-01) -
Exploring presentation attack vulnerability and usability of face recognition systems
by: Heinz Hofbauer, et al.
Published: (2021-03-01) -
A survey of face recognition techniques under occlusion
by: Dan Zeng, et al.
Published: (2021-11-01)