The following publications are possibly variants of this publication:
- You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on SmartphonesSi Chen, Kui Ren, Sixu Piao, Cong Wang, Qian Wang, Jian Weng, Lu Su, Aziz Mohaisen. icdcs 2017: 183-195 [doi]
- You Can Clone But You Cannot Hide: A Survey of Clone Prevention and Detection for RFIDKai Bu, Minyu Weng, Yi Zheng, Bin Xiao, Xuan Liu. comsur, 19(3):1682-1700, 2017. [doi]
- You Can Yak But You Can't HideCarson L. Nemelka, Cameron L. Ballard, Kelvin Liu, Minhui Xue, Keith W. Ross. cosn 2015: 99 [doi]
- Coding Split and Adjustment to Defend OFDM-IM Against Jamming AttacksYinglin Chen, Weijie Yuan, Tongyang Xu. icl, 27(2):457-461, February 2023. [doi]