关注
Yushi Cheng
Yushi Cheng
Assistant Professor, Zhejiang University
在 zju.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Cyber-attack classification in smart grid via deep neural network
L Zhou, X Ouyang, H Ying, L Han, Y Cheng, T Zhang
Proceedings of the 2nd international conference on computer science and …, 2018
752018
Dewicam: Detecting hidden wireless cameras via smartphones
Y Cheng, X Ji, T Lu, W Xu
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
662018
Poltergeist: Acoustic adversarial machine learning against cameras and computer vision
X Ji, Y Cheng, Y Zhang, K Wang, C Yan, W Xu, K Fu
2021 IEEE Symposium on Security and Privacy (SP), 160-175, 2021
652021
Demicpu: Device fingerprinting with magnetic signals radiated by cpu
Y Cheng, X Ji, J Zhang, W Xu, YC Chen
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
622019
Pla-lidar: Physical laser attacks against lidar-based 3d object detection in autonomous vehicle
Z Jin, X Ji, Y Cheng, B Yang, C Yan, W Xu
2023 IEEE Symposium on Security and Privacy (SP), 1822-1839, 2023
372023
Magattack: Guessing application launching and operation via smartphone
Y Cheng, X Ji, W Xu, H Pan, Z Zhu, CW You, YC Chen, L Qiu
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
282019
On detecting hidden wireless cameras: A traffic pattern-based approach
Y Cheng, X Ji, T Lu, W Xu
IEEE Transactions on Mobile Computing 19 (4), 907-921, 2019
282019
Identifying child users via touchscreen interactions
Y Cheng, X Ji, X Li, T Zhang, S Malebary, X Qu, W Xu
ACM Transactions on Sensor Networks (TOSN) 16 (4), 1-25, 2020
232020
Power message generation in smart grid via generative adversarial network
H Ying, X Ouyang, S Miao, Y Cheng
2019 IEEE 3rd Information Technology, Networking, Electronic and Automation …, 2019
222019
iCare: Automatic and user-friendly child identification on smartphones
X Li, S Malebary, X Qu, X Ji, Y Cheng, W Xu
Proceedings of the 19th International Workshop on Mobile Computing Systems …, 2018
182018
HomeSpy: Inferring User Presence via Encrypted Traffic of Home Surveillance Camera.
Y Cheng, X Ji, X Zhou, W Xu
ICPADS, 779-782, 2017
162017
{TPatch}: A Triggered Physical Adversarial Patch
W Zhu, X Ji, Y Cheng, S Zhang, W Xu
32nd USENIX Security Symposium (USENIX Security 23), 661-678, 2023
142023
User presence inference via encrypted traffic of wireless camera in smart homes
X Ji, Y Cheng, W Xu, X Zhou
Security and Communication Networks 2018 (1), 3980371, 2018
132018
{mID}: Tracing screen photos via {Moiré} patterns
Y Cheng, X Ji, L Wang, Q Pang, YC Chen, W Xu
30th USENIX Security Symposium (USENIX Security 21), 2969-2986, 2021
122021
Detecting buffer-overflow vulnerabilities in smart grid devices via automatic static analysis
H Ying, Y Zhang, L Han, Y Cheng, J Li, X Ji, W Xu
2019 IEEE 3rd Information Technology, Networking, Electronic and Automation …, 2019
112019
" OK, Siri" or" Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score.
R He, X Ji, X Li, Y Cheng, W Xu
USENIX Security Symposium, 1131-1148, 2022
102022
Pido: Predictive delay optimization for intertidal wireless sensor networks
X Zhou, X Ji, B Wang, Y Cheng, Z Ma, F Choi, B Helmuth, W Xu
Sensors 18 (5), 1464, 2018
102018
No seeing is also believing: electromagnetic-emission-based application guessing attacks via smartphones
X Ji, Y Cheng, W Xu, Y Chi, H Pan, Z Zhu, CW You, YC Chen, L Qiu
IEEE Transactions on Mobile Computing 22 (2), 1095-1109, 2021
82021
Ultrabd: Backdoor attack against automatic speaker verification systems via adversarial ultrasound
J Ze, X Li, Y Cheng, X Ji, W Xu
2022 IEEE 28th International Conference on Parallel and Distributed Systems …, 2023
72023
DepthFake: Spoofing 3D Face Authentication with a 2D Photo
Z Wu, Y Cheng, J Yang, X Ji, W Xu
2023 IEEE Symposium on Security and Privacy (SP), 917-91373, 2023
62023
系统目前无法执行此操作,请稍后再试。
文章 1–20