Cyber-attack classification in smart grid via deep neural network L Zhou, X Ouyang, H Ying, L Han, Y Cheng, T Zhang Proceedings of the 2nd international conference on computer science and …, 2018 | 75 | 2018 |
Dewicam: Detecting hidden wireless cameras via smartphones Y Cheng, X Ji, T Lu, W Xu Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 66 | 2018 |
Poltergeist: Acoustic adversarial machine learning against cameras and computer vision X Ji, Y Cheng, Y Zhang, K Wang, C Yan, W Xu, K Fu 2021 IEEE Symposium on Security and Privacy (SP), 160-175, 2021 | 65 | 2021 |
Demicpu: Device fingerprinting with magnetic signals radiated by cpu Y Cheng, X Ji, J Zhang, W Xu, YC Chen Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 62 | 2019 |
Pla-lidar: Physical laser attacks against lidar-based 3d object detection in autonomous vehicle Z Jin, X Ji, Y Cheng, B Yang, C Yan, W Xu 2023 IEEE Symposium on Security and Privacy (SP), 1822-1839, 2023 | 37 | 2023 |
Magattack: Guessing application launching and operation via smartphone Y Cheng, X Ji, W Xu, H Pan, Z Zhu, CW You, YC Chen, L Qiu Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019 | 28 | 2019 |
On detecting hidden wireless cameras: A traffic pattern-based approach Y Cheng, X Ji, T Lu, W Xu IEEE Transactions on Mobile Computing 19 (4), 907-921, 2019 | 28 | 2019 |
Identifying child users via touchscreen interactions Y Cheng, X Ji, X Li, T Zhang, S Malebary, X Qu, W Xu ACM Transactions on Sensor Networks (TOSN) 16 (4), 1-25, 2020 | 23 | 2020 |
Power message generation in smart grid via generative adversarial network H Ying, X Ouyang, S Miao, Y Cheng 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation …, 2019 | 22 | 2019 |
iCare: Automatic and user-friendly child identification on smartphones X Li, S Malebary, X Qu, X Ji, Y Cheng, W Xu Proceedings of the 19th International Workshop on Mobile Computing Systems …, 2018 | 18 | 2018 |
HomeSpy: Inferring User Presence via Encrypted Traffic of Home Surveillance Camera. Y Cheng, X Ji, X Zhou, W Xu ICPADS, 779-782, 2017 | 16 | 2017 |
{TPatch}: A Triggered Physical Adversarial Patch W Zhu, X Ji, Y Cheng, S Zhang, W Xu 32nd USENIX Security Symposium (USENIX Security 23), 661-678, 2023 | 14 | 2023 |
User presence inference via encrypted traffic of wireless camera in smart homes X Ji, Y Cheng, W Xu, X Zhou Security and Communication Networks 2018 (1), 3980371, 2018 | 13 | 2018 |
{mID}: Tracing screen photos via {Moiré} patterns Y Cheng, X Ji, L Wang, Q Pang, YC Chen, W Xu 30th USENIX Security Symposium (USENIX Security 21), 2969-2986, 2021 | 12 | 2021 |
Detecting buffer-overflow vulnerabilities in smart grid devices via automatic static analysis H Ying, Y Zhang, L Han, Y Cheng, J Li, X Ji, W Xu 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation …, 2019 | 11 | 2019 |
" OK, Siri" or" Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score. R He, X Ji, X Li, Y Cheng, W Xu USENIX Security Symposium, 1131-1148, 2022 | 10 | 2022 |
Pido: Predictive delay optimization for intertidal wireless sensor networks X Zhou, X Ji, B Wang, Y Cheng, Z Ma, F Choi, B Helmuth, W Xu Sensors 18 (5), 1464, 2018 | 10 | 2018 |
No seeing is also believing: electromagnetic-emission-based application guessing attacks via smartphones X Ji, Y Cheng, W Xu, Y Chi, H Pan, Z Zhu, CW You, YC Chen, L Qiu IEEE Transactions on Mobile Computing 22 (2), 1095-1109, 2021 | 8 | 2021 |
Ultrabd: Backdoor attack against automatic speaker verification systems via adversarial ultrasound J Ze, X Li, Y Cheng, X Ji, W Xu 2022 IEEE 28th International Conference on Parallel and Distributed Systems …, 2023 | 7 | 2023 |
DepthFake: Spoofing 3D Face Authentication with a 2D Photo Z Wu, Y Cheng, J Yang, X Ji, W Xu 2023 IEEE Symposium on Security and Privacy (SP), 917-91373, 2023 | 6 | 2023 |