Yosef A. Solewicz

Orcid: 0000-0003-3987-1201

According to our database1, Yosef A. Solewicz authored at least 28 papers between 2001 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Speaker-to-speaker covert ultrasonic communication.
J. Inf. Secur. Appl., 2020

Fansmitter: Acoustic data exfiltration from air-Gapped computers via fans noise.
Comput. Secur., 2020

2019
Digital Audio Signature for 3D Printing Integrity.
IEEE Trans. Inf. Forensics Secur., 2019

Evaluation of Nuance Forensics 9.2 and 11.1 under conditions reflecting those of a real forensic voice comparison case (forensic_eval_01).
Speech Commun., 2019

Evaluation of Phonexia automatic speaker recognition software under conditions reflecting those of a real forensic voice comparison case (<i>forensic_eval_01</i>).
Speech Commun., 2019

Detecting Sabotage Attacks in Additive Manufacturing Using Actuator Power Signatures.
IEEE Access, 2019

2018
MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication.
CoRR, 2018

MOSQUITO: Covert Ultrasonic Transmissions Between Two Air-Gapped Computers Using Speaker-to-Speaker Communication.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
Predicting interviewee attitude and body language from speech descriptors.
CoRR, 2017

Detecting Cyber-Physical Attacks in Additive Manufacturing using Digital Audio Signing.
CoRR, 2017

SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

Null-Hypothesis LLR: A Proposal for Forensic Automatic Speaker Recognition.
Proceedings of the Interspeech 2017, 2017

Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise ('DiskFiltration').
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Improved nuisance attribute projection for face recognition.
Pattern Anal. Appl., 2016

DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise.
CoRR, 2016

Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers.
CoRR, 2016

Reducing Noise Bias in the i-Vector Space for Speaker Recognition.
Proceedings of the Odyssey 2016: The Speaker and Language Recognition Workshop, 2016

2012
Comparison of speaker recognition systems on a real forensic benchmark.
Proceedings of the Odyssey 2012: The Speaker and Language Recognition Workshop, 2012

Online two speaker diarization.
Proceedings of the Odyssey 2012: The Speaker and Language Recognition Workshop, 2012

2011
Method of verifying declared identity in optical answer sheets.
Soft Comput., 2011

Implicit Segmentation in Two-Wire Speaker Recognition.
Proceedings of the INTERSPEECH 2011, 2011

2009
Two-wire nuisance attribute projection.
Proceedings of the INTERSPEECH 2009, 2009

2008
Speaker recognition in two-wire test sessions.
Proceedings of the INTERSPEECH 2008, 2008

2007
UsingPost-Classifiers to Enhance Fusion of Low- and High-Level Speaker Recognition.
IEEE Trans. Speech Audio Process., 2007

Virtual fusion for speaker recognition.
Proceedings of the INTERSPEECH 2007, 2007

2005
Selective Fusion for Speaker Verification in Surveillance.
Proceedings of the Intelligence and Security Informatics, 2005

Considering speech quality in speaker verification fusion.
Proceedings of the INTERSPEECH 2005, 2005

2001
Noise robustness in forensic speaker verification.
Proceedings of the 2001: A Speaker Odyssey, 2001


  Loading...