Back to Results
First PageMeta Content
Input/output / Computer keyboard / Speech recognition / Typing / Cepstrum / Linear classifier / Password / Function key / Computer security compromised by hardware failure / Human–computer interaction / Computing / Statistics


To appear in the ACM Transactions on Information and Systems Security Keyboard Acoustic Emanations Revisited Li Zhuang, Feng Zhou, J. D. Tygar University of California, Berkeley {zl,zf,tygar}@cs.berkeley.edu
Add to Reading List

Document Date: 2009-09-11 13:19:34


Open Document

File Size: 549,57 KB

Share Result on Facebook

City

Feedback / /

Company

Russell / Mel-Scale Filter Bank / /

Country

Jordan / /

/

Facility

J. D. Tygar University of California / /

IndustryTerm

energy levels / neural networks / electronic devices / classification algorithms / trained neural network / Possible algorithms / neural network / wireless microphone / energy / /

Organization

University of California / Berkeley / /

Person

Feng Zhou / /

Position

Build keystroke classifier using unsupervised learning Sample Collector / typist / same typist / Privacy General / /

Technology

radiation / classification algorithms / HMM algorithms / laser / speech recognition / machine learning / voice recognition / SSH protocol / neural network / Viterbi algorithm / /

SocialTag