2019
DOI: 10.5281/zenodo.2537721
|View full text |Cite
|
Sign up to set email alerts
|

Index of supplementary files from "Perils of Zero-Interaction Security in the Internet of Things"

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Finally, we release the first extensible open source toolkit [9] for researching zero-interaction security, containing reference implementations of the reproduced schemes, the audio recordings of the mob/het scenario, and over 1 billion samples of labeled sensor data. We also release all data generated by our evaluation to facilitate the reproduction of our results and provide a common benchmarking baseline for future schemes.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Finally, we release the first extensible open source toolkit [9] for researching zero-interaction security, containing reference implementations of the reproduced schemes, the audio recordings of the mob/het scenario, and over 1 billion samples of labeled sensor data. We also release all data generated by our evaluation to facilitate the reproduction of our results and provide a common benchmarking baseline for future schemes.…”
Section: Discussionmentioning
confidence: 99%
“…Privacy concerns prevent us from releasing the audio data recorded in the Car and Office scenarios, but we are able to provide researchers with the audio recordings from the Mobile scenario upon request [8]. See [9] for an index of all released data and code.…”
Section: Reproducibility and Re-usabilitymentioning
confidence: 99%
See 2 more Smart Citations
“…The audio dataset [30] as well as the mobile, office, and car datasets [9] came from publicly available postings. To evaluate the audio, we created the bit stream using a commonly used algorithm [28].…”
Section: Evaluation Of Moonshinementioning
confidence: 99%