default search action
Wenyuan Xu 0001
Person information
- affiliation: Zhejiang University, China
Other persons with the same name
- Wenyuan Xu — disambiguation page
- Wenyuan Xu 0002 — University of Minnesota, Department of Electrical Engineering, MN, USA
- Wenyuan Xu 0003 — Northeast Forestry University, School of Civil Engineering, Harbin, China
- Wenyuan Xu 0004 — China Shipbuilding Industry, Systems Engineering Research Institute, Beijing, China
- Wenyuan Xu 0005 — University of South Carolina, Department of Computer Science and Engineering, Columbia, SC, USA (and 1 more)
- Wenyuan Xu 0006 — Yangzhou University, School of Information Engineering, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j61]Xinfeng Li, Zhicong Zheng, Chen Yan, Chaohao Li, Xiaoyu Ji, Wenyuan Xu:
Toward Pitch-Insensitive Speaker Verification via Soundfield. IEEE Internet Things J. 11(1): 1175-1189 (2024) - [j60]Xinfeng Li, Junning Ze, Chen Yan, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
Enrollment-Stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound. IEEE Internet Things J. 11(8): 13108-13124 (2024) - [j59]Ruiwen He, Yushi Cheng, Zhicong Zheng, Xiaoyu Ji, Wenyuan Xu:
Fast and Lightweight Voice Replay Attack Detection via Time-Frequency Spectrum Difference. IEEE Internet Things J. 11(18): 29798-29810 (2024) - [j58]Qianhao Miao, Tianyu Ren, Jiahan Dong, Yanjiao Chen, Wenyuan Xu:
A 3C Authentication: A Cross-Domain, Certificateless, and Consortium-Blockchain-Based Authentication Method for Vehicle-to-Grid Networks in a Smart Grid. Symmetry 16(3): 336 (2024) - [j57]Yinan Zhong, Mingyu Pan, Yanjiao Chen, Wenyuan Xu:
Res-DFNN: An NN-Based Device Fingerprint Extraction Method Using Network Packet Data. Symmetry 16(4): 443 (2024) - [j56]Wenyuan Xu, Yushi Cheng, Xiaoyu Ji, Yi-Chao Chen:
On Tracing Screen Photos - A Moiré Pattern-Based Approach. IEEE Trans. Dependable Secur. Comput. 21(4): 2068-2084 (2024) - [j55]Yan Jiang, Xiaoyu Ji, Juchuan Zhang, Yancheng Jiang, Shui Jiang, Wenyuan Xu:
CapSpeaker: Injecting Commands to Voice Assistants Via Capacitors. IEEE Trans. Dependable Secur. Comput. 21(4): 3295-3308 (2024) - [j54]Yan Jiang, Xiaoyu Ji, Kai Wang, Chen Yan, Richard Mitev, Ahmad-Reza Sadeghi, Wenyuan Xu:
Marionette: Manipulate Your Touchscreen via a Charging Cable. IEEE Trans. Dependable Secur. Comput. 21(4): 3309-3323 (2024) - [j53]Yushi Cheng, Xiaoyu Ji, Wenjun Zhu, Shibo Zhang, Kevin Fu, Wenyuan Xu:
Adversarial Computer Vision via Acoustic Manipulation of Camera Sensors. IEEE Trans. Dependable Secur. Comput. 21(4): 3734-3750 (2024) - [j52]Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu:
Analyzing and Defending GhostTouch Attack Against Capacitive Touchscreens. IEEE Trans. Dependable Secur. Comput. 21(5): 4360-4375 (2024) - [j51]Jiangyi Deng, Xiaoyu Ji, Beibei Wang, Bin Wang, Wenyuan Xu:
Dr. Defender: Proactive Detection of Autopilot Drones Based on CSI. IEEE Trans. Inf. Forensics Secur. 19: 194-206 (2024) - [j50]Xiaoyu Ji, Qinhong Jiang, Chaohao Li, Zhuoyang Shi, Wenyuan Xu:
Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification. IEEE Trans. Inf. Forensics Secur. 19: 3366-3379 (2024) - [j49]Xiaoyu Ji, Juchuan Zhang, Shan Zou, Yi-Chao Chen, Gang Qu, Wenyuan Xu:
MagView++: Data Exfiltration via CPU Magnetic Signals Under Video Decoding. IEEE Trans. Mob. Comput. 23(3): 2486-2503 (2024) - [j48]Guoming Zhang, Xiaoyu Ji, Xinyan Zhou, Donglian Qi, Wenyuan Xu:
Ultrasound Communication Using the Nonlinearity Effect of Microphone Circuits in Smart Devices. ACM Trans. Sens. Networks 20(3): 53:1-53:22 (2024) - [j47]Yushi Cheng, Boyang Zhou, Yanjiao Chen, Yi-Chao Chen, Xiaoyu Ji, Wenyuan Xu:
Evaluating Compressive Sensing on the Security of Computer Vision Systems. ACM Trans. Sens. Networks 20(3): 56:1-56:24 (2024) - [c99]Youqian Zhang, Chunxi Yang, Eugene Yujun Fu, Qinhong Jiang, Chen Yan, Sze-Yiu Chau, Grace Ngai, Hong Va Leong, Xiapu Luo, Wenyuan Xu:
Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection. ICME 2024: 1-6 - [c98]Qinhong Jiang, Yanze Ren, Yan Long, Chen Yan, Yumai Sun, Xiaoyu Ji, Kevin Fu, Wenyuan Xu:
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards. NDSS 2024 - [c97]Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu:
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time. NDSS 2024 - [c96]Yan Long, Qinhong Jiang, Chen Yan, Tobias Alam, Xiaoyu Ji, Wenyuan Xu, Kevin Fu:
EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras. NDSS 2024 - [c95]Zhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji, Wenyuan Xu:
UniID: Spoofing Face Authentication System by Universal Identity. NDSS 2024 - [c94]Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
CamPro: Camera-based Anti-Facial Recognition. NDSS 2024 - [c93]Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu:
Understanding and Benchmarking the Commonality of Adversarial Examples. SP 2024: 1665-1683 - [c92]Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Liangming Xia, Yijie Bai, Haiqin Weng, Wenyuan Xu:
Sophon: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models. SP 2024: 2553-2571 - [c91]Zizhi Jin, Xuancun Lu, Bo Yang, Yushi Cheng, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
Unity is Strength? Benchmarking the Robustness of Fusion-based 3D Object Detection against Physical Sensor Attack. WWW 2024: 3031-3042 - [e1]Davide Balzarotti, Wenyuan Xu:
33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024. USENIX Association 2024 [contents] - [i21]Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu:
TPatch: A Triggered Physical Adversarial Patch. CoRR abs/2401.00148 (2024) - [i20]Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
CamPro: Camera-based Anti-Facial Recognition. CoRR abs/2401.00151 (2024) - [i19]Xinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan, Yanjiao Chen, Xiaoyu Ji, Wenyuan Xu:
SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models. CoRR abs/2404.06666 (2024) - [i18]Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Liangming Xia, Yijie Bai, Haiqin Weng, Wenyuan Xu:
SOPHON: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models. CoRR abs/2404.12699 (2024) - [i17]Youqian Zhang, Chunxi Yang, Eugene Yujun Fu, Qinhong Jiang, Chen Yan, Sze-Yiu Chau, Grace Ngai, Hong Va Leong, Xiapu Luo, Wenyuan Xu:
Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection. CoRR abs/2407.16327 (2024) - [i16]Jialin Wu, Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Jiayang Xu, Xinfeng Li, Wenyuan Xu:
Legilimens: Practical and Unified Content Moderation for Large Language Model Services. CoRR abs/2408.15488 (2024) - [i15]Jiangyi Deng, Xinfeng Li, Yanjiao Chen, Yijie Bai, Haiqin Weng, Yan Liu, Tao Wei, Wenyuan Xu:
RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer. CoRR abs/2409.02074 (2024) - [i14]Zizhi Jin, Qinhong Jiang, Xuancun Lu, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR. CoRR abs/2409.17907 (2024) - 2023
- [j46]Chen Yan, Xiaoyu Ji, Kai Wang, Qinhong Jiang, Zizhi Jin, Wenyuan Xu:
A Survey on Voice Assistant Security: Attacks and Countermeasures. ACM Comput. Surv. 55(4): 84:1-84:36 (2023) - [j45]Xiaoyu Ji, Yushi Cheng, Wenyuan Xu, Yuehan Chi, Hao Pan, Zhuangdi Zhu, Chuang-Wen You, Yi-Chao Chen, Lili Qiu:
No Seeing is Also Believing: Electromagnetic-Emission-Based Application Guessing Attacks via Smartphones. IEEE Trans. Mob. Comput. 22(2): 1095-1109 (2023) - [j44]Weiwei Fang, Wenyuan Xu, Chongchong Yu, Neal N. Xiong:
Joint Architecture Design and Workload Partitioning for DNN Inference on Industrial IoT Clusters. ACM Trans. Internet Techn. 23(1): 7:1-7:21 (2023) - [j43]Yanjiao Chen, Yushi Cheng, Xiaoyu Ji, Boyang Zhou, Wenyuan Xu, Fei Teng:
PDGes: An Interpretable Detection Model for Parkinson's Disease Using Smartphones. ACM Trans. Sens. Networks 19(4): 77:1-77:21 (2023) - [j42]Zefang Lv, Liang Xiao, Yousong Du, Guohang Niu, Chengwen Xing, Wenyuan Xu:
Multi-Agent Reinforcement Learning Based UAV Swarm Communications Against Jamming. IEEE Trans. Wirel. Commun. 22(12): 9063-9075 (2023) - [c90]Wenyuan Xu:
Rethinking IoT Security: Understanding and Mitigating Out-of-Band Vulnerabilities. AsiaCCS 2023: 1 - [c89]Lingshuo Meng, Yijie Bai, Yanjiao Chen, Yutong Hu, Wenyuan Xu, Haiqin Weng:
Devil in Disguise: Breaching Graph Neural Networks Privacy through Infiltration. CCS 2023: 1153-1167 - [c88]Shilin Xiao, Xiaoyu Ji, Chen Yan, Zhicong Zheng, Wenyuan Xu:
MicPro: Microphone-based Voice Privacy Protection. CCS 2023: 1302-1316 - [c87]Zefang Lv, Guohang Niu, Liang Xiao, Chengwen Xing, Wenyuan Xu:
Reinforcement Learning Based UAV Swarm Communications Against Jamming. ICC 2023: 5204-5209 - [c86]Chen Zhang, Boyang Zhou, Zhiqiang He, Zeyuan Liu, Yanjiao Chen, Wenyuan Xu, Baochun Li:
Oblivion: Poisoning Federated Learning by Inducing Catastrophic Forgetting. INFOCOM 2023: 1-10 - [c85]Zhicong Zheng, Xinfeng Li, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
The Silent Manipulator: A Practical and Inaudible Backdoor Attack against Speech Recognition Systems. ACM Multimedia 2023: 7849-7858 - [c84]Zhixin Xie, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
BitDance: Manipulating UART Serial Communication with IEMI. RAID 2023: 63-76 - [c83]Zhihao Wu, Yushi Cheng, Jiahui Yang, Xiaoyu Ji, Wenyuan Xu:
DepthFake: Spoofing 3D Face Authentication with a 2D Photo. SP 2023: 917-91373 - [c82]Kai Wang, Shilin Xiao, Xiaoyu Ji, Chen Yan, Chaohao Li, Wenyuan Xu:
Volttack: Control IoT Devices by Manipulating Power Supply Voltage. SP 2023: 1771-1788 - [c81]Zizhi Jin, Xiaoyu Ji, Yushi Cheng, Bo Yang, Chen Yan, Wenyuan Xu:
PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle. SP 2023: 1822-1839 - [c80]Ruochen Zhou, Xiaoyu Ji, Chen Yan, Yi-Chao Chen, Wenyuan Xu, Chaohao Li:
DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation. SP 2023: 3113-3128 - [c79]Yan Long, Chen Yan, Shilin Xiao, Shivan Prasad, Wenyuan Xu, Kevin Fu:
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing. SP 2023: 3432-3449 - [c78]Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu:
TPatch: A Triggered Physical Adversarial Patch. USENIX Security Symposium 2023: 661-678 - [c77]Shibo Zhang, Yushi Cheng, Wenjun Zhu, Xiaoyu Ji, Wenyuan Xu:
CAPatch: Physical Adversarial Patch against Image Captioning Systems. USENIX Security Symposium 2023: 679-696 - [c76]Xinfeng Li, Xiaoyu Ji, Chen Yan, Chaohao Li, Yichen Li, Zhenning Zhang, Wenyuan Xu:
Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks. USENIX Security Symposium 2023: 2455-2472 - [c75]Yijie Bai, Yanjiao Chen, Hanlei Zhang, Wenyuan Xu, Haiqin Weng, Dou Goodman:
VILLAIN: Backdoor Attacks Against Vertical Split Learning. USENIX Security Symposium 2023: 2743-2760 - [c74]Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu:
Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion. USENIX Security Symposium 2023: 5163-5180 - [c73]Jiangyi Deng, Fei Teng, Yanjiao Chen, Xiaofu Chen, Zhaohui Wang, Wenyuan Xu:
V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization. USENIX Security Symposium 2023: 5181-5198 - [c72]Qinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou, Wenyuan Xu:
GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI. USENIX Security Symposium 2023: 7249-7266 - [i13]Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu:
Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion. CoRR abs/2302.12434 (2023) - [i12]Xinfeng Li, Junning Ze, Chen Yan, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound. CoRR abs/2306.16022 (2023) - [i11]Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu:
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time. CoRR abs/2308.01040 (2023) - [i10]Bo Yang, Xiaoyu Ji, Zizhi Jin, Yushi Cheng, Wenyuan Xu:
Exploring Adversarial Robustness of LiDAR-Camera Fusion Model in Autonomous Driving. CoRR abs/2312.01468 (2023) - 2022
- [j41]Taimin Zhang, Xiaoyu Ji, Wenyuan Xu:
Jamming-Resilient Backup Nodes Selection for RPL-based Routing in Smart Grid AMI Networks. Mob. Networks Appl. 27(1): 329-342 (2022) - [j40]Jiayu Zhang, Min Li, Min-Jian Zhao, Xiaoyu Ji, Wenyuan Xu:
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication. IEEE Trans. Inf. Forensics Secur. 17: 1528-1543 (2022) - [j39]Xiaoyu Ji, Xinyan Zhou, Chen Yan, Jiangyi Deng, Wenyuan Xu:
A Nonlinearity-Based Secure Face-to-Face Device Authentication for Mobile Devices. IEEE Trans. Mob. Comput. 21(4): 1155-1171 (2022) - [j38]Xiaoyu Ji, Yushi Cheng, Juchuan Zhang, Yuehan Chi, Wenyuan Xu, Yi-Chao Chen:
Device Fingerprinting with Magnetic Induction Signals Radiated by CPU Modules. ACM Trans. Sens. Networks 18(2): 23:1-23:28 (2022) - [c71]Jiangyi Deng, Yanjiao Chen, Wenyuan Xu:
FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems. CCS 2022: 755-767 - [c70]Jiachang Wen, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
Power IoT System Security Monitoring Based On Power Consumption Side Channel Information. EEET 2022: 59-65 - [c69]Jiahui Yang, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
A Small Sticker is Enough: Spoofing Face Recognition Systems via Small Stickers. EITCE 2022: 1075-1082 - [c68]Junning Ze, Xinfeng Li, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
UltraBD: Backdoor Attack against Automatic Speaker Verification Systems via Adversarial Ultrasound. ICPADS 2022: 193-200 - [c67]Shan Zou, Juchuan Zhang, Shui Jiang, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
OutletGuarder: Detecting DarkSide Ransomware by Power Factor Correction Signals in an Electrical Outlet. ICPADS 2022: 419-426 - [c66]Yan Jiang, Xiaoyu Ji, Kai Wang, Chen Yan, Richard Mitev, Ahmad-Reza Sadeghi, Wenyuan Xu:
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens. SP 2022: 984-1001 - [c65]Ruiwen He, Xiaoyu Ji, Xinfeng Li, Yushi Cheng, Wenyuan Xu:
"OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score. USENIX Security Symposium 2022: 1131-1148 - [c64]Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu:
GhostTouch: Targeted Attacks on Touchscreens without Physical Touch. USENIX Security Symposium 2022: 1543-1559 - [c63]Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu:
Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition. USENIX Security Symposium 2022: 1957-1974 - [i9]Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu:
Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition. CoRR abs/2204.02675 (2022) - [i8]Yan Long, Chen Yan, Shivan Prasad, Wenyuan Xu, Kevin Fu:
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing. CoRR abs/2205.03971 (2022) - [i7]Jiangyi Deng, Fei Teng, Yanjiao Chen, Xiaofu Chen, Zhaohui Wang, Wenyuan Xu:
V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization. CoRR abs/2210.15140 (2022) - 2021
- [j37]Wenyuan Xu, Weiwei Fang, Yi Ding, Meixia Zou, Naixue Xiong:
Accelerating Federated Learning for IoT in Big Data Analytics With Pruning, Quantization and Selective Updating. IEEE Access 9: 38457-38466 (2021) - [j36]Mengran Liu, Weiwei Fang, Xiaodong Ma, Wenyuan Xu, Naixue Xiong, Yi Ding:
Channel pruning guided by spatial and channel attention for DNNs in intelligent edge computing. Appl. Soft Comput. 110: 107636 (2021) - [j35]Jiayu Zhang, Zhiyun Wang, Xiaoyu Ji, Wenyuan Xu, Gang Qu, Minjian Zhao:
Who is Charging My Phone? Identifying Wireless Chargers via Fingerprinting. IEEE Internet Things J. 8(4): 2992-2999 (2021) - [j34]Chen Yan, Guoming Zhang, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu:
The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants. IEEE Trans. Dependable Secur. Comput. 18(3): 1108-1124 (2021) - [j33]Chaohao Li, Xiaoyu Ji, Bin Wang, Kai Wang, Wenyuan Xu:
SenCS: Enabling Real-time Indoor Proximity Verification via Contextual Similarity. ACM Trans. Sens. Networks 17(2): 19:1-19:22 (2021) - [j32]Yilin Xiao, Liang Xiao, Zefang Lv, Guohang Niu, Yuzhen Ding, Wenyuan Xu:
Learning-Based Low-Latency VIoT Video Streaming Against Jamming and Interference. IEEE Wirel. Commun. 28(4): 12-18 (2021) - [c62]Yanjiao Chen, Yijie Bai, Richard Mitev, Kaibo Wang, Ahmad-Reza Sadeghi, Wenyuan Xu:
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants. CCS 2021: 1861-1883 - [c61]Xiaoyu Ji, Juchuan Zhang, Shui Jiang, Jishen Li, Wenyuan Xu:
CapSpeaker: Injecting Voices to Microphones via Capacitors. CCS 2021: 1915-1929 - [c60]Weizhao Jin, Xiaoyu Ji, Ruiwen He, Zhou Zhuang, Wenyuan Xu, Yuan Tian:
SMS Goes Nuclear: Fortifying SMS-Based MFA in Online Account Ecosystem. DSN Workshops 2021: 7-14 - [c59]Zhuoyang Shi, Chaohao Li, Zizhi Jin, Weinong Sun, Xiaoyu Ji, Wenyuan Xu:
Anti-Replay: A Fast and Lightweight Voice Replay Attack Detection System. ICPADS 2021: 169-176 - [c58]Guoming Zhang, Xiaoyu Ji, Xinfeng Li, Gang Qu, Wenyuan Xu:
EarArray: Defending against DolphinAttack via Acoustic Attenuation. NDSS 2021 - [c57]Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, Kevin Fu:
Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision. SP 2021: 160-175 - [c56]Yushi Cheng, Xiaoyu Ji, Lixu Wang, Qi Pang, Yi-Chao Chen, Wenyuan Xu:
mID: Tracing Screen Photos via Moiré Patterns. USENIX Security Symposium 2021: 2969-2986 - [c55]Juchuan Zhang, Xiaoyu Ji, Yuehan Chi, Yi-Chao Chen, Bin Wang, Wenyuan Xu:
OutletSpy: cross-outlet application inference via power factor correction signal. WISEC 2021: 181-191 - [i6]Weizhao Jin, Xiaoyu Ji, Ruiwen He, Zhou Zhuang, Wenyuan Xu, Yuan Tian:
Towards Fortifying the Multi-Factor-Based Online Account Ecosystem. CoRR abs/2104.08651 (2021) - [i5]Yanjiao Chen, Yijie Bai, Richard Mitev, Kaibo Wang, Ahmad-Reza Sadeghi, Wenyuan Xu:
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants. CoRR abs/2109.09958 (2021) - 2020
- [j31]Guoming Zhang, Xiaoyu Ji, Yanjie Li, Wenyuan Xu:
Power-Based Non-Intrusive Condition Monitoring for Terminal Device in Smart Grid. Sensors 20(13): 3635 (2020) - [j30]Wenyuan Xu, Jing Tian, Yu Cao, Song Wang:
Challenge-Response Authentication Using In-Air Handwriting Style Verification. IEEE Trans. Dependable Secur. Comput. 17(1): 51-64 (2020) - [j29]Weili Han, Chang Cao, Hao Chen, Dong Li, Zheran Fang, Wenyuan Xu, X. Sean Wang:
senDroid: Auditing Sensor Access in Android System-Wide. IEEE Trans. Dependable Secur. Comput. 17(2): 407-421 (2020) - [j28]Xiaoyu Ji, Chaohao Li, Xinyan Zhou, Juchuan Zhang, Yanmiao Zhang, Wenyuan Xu:
Authenticating Smart Home Devices via Home Limited Channels. ACM Trans. Internet Things 1(4): 24:1-24:24 (2020) - [j27]Yushi Cheng, Xiaoyu Ji, Tianyang Lu, Wenyuan Xu:
On Detecting Hidden Wireless Cameras: A Traffic Pattern-based Approach. IEEE Trans. Mob. Comput. 19(4): 907-921 (2020) - [j26]Hui Chen, Guiguang Ding, Zijia Lin, Sicheng Zhao, Xiaopeng Gu, Wenyuan Xu, Jungong Han:
ACMNet: Adaptive Confidence Matching Network for Human Behavior Analysis via Cross-modal Retrieval. ACM Trans. Multim. Comput. Commun. Appl. 16(1s): 27:1-27:21 (2020) - [j25]Xiaoyu Ji, Xinyan Zhou, Miao Xu, Wenyuan Xu, Yabo Dong:
OPCIO: Optimizing Power Consumption for Embedded Devices via GPIO Configuration. ACM Trans. Sens. Networks 16(2): 16:1-16:28 (2020) - [j24]Yushi Cheng, Xiaoyu Ji, Xiaopeng Li, Tianchen Zhang, Sharaf J. Malebary, Xianshan Qu, Wenyuan Xu:
Identifying Child Users via Touchscreen Interactions. ACM Trans. Sens. Networks 16(4): 35:1-35:25 (2020) - [c54]Karoline Busse, Mohammad Tahaei, Katharina Krombholz, Emanuel von Zezschwitz, Matthew Smith, Jing Tian, Wenyuan Xu:
Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries. EuroS&P Workshops 2020: 200-209 - [c53]Feng Xue, Weiwei Fang, Wenyuan Xu, Qi Wang, Xiaodong Ma, Yi Ding:
EdgeLD: Locally Distributed Deep Learning Inference on Edge Device Clusters. HPCC/DSS/SmartCity 2020: 613-619 - [c52]Juchuan Zhang, Xiaoyu Ji, Wenyuan Xu, Yi-Chao Chen, Yuting Tang, Gang Qu:
MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding. INFOCOM 2020: 357-366 - [c51]Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, Kevin Fu:
SoK: A Minimalist Approach to Formalizing Analog Sensor Security. SP 2020: 233-248 - [i4]Mengran Liu, Weiwei Fang, Xiaodong Ma, Wenyuan Xu, Naixue Xiong, Yi Ding:
Channel Pruning Guided by Spatial and Channel Attention for DNNs in Intelligent Edge Computing. CoRR abs/2011.03891 (2020)
2010 – 2019
- 2019
- [j23]Chen Yan, Kevin Fu, Wenyuan Xu:
On Cuba, diplomats, ultrasound, and intermodulation distortion. Comput. Biol. Medicine 104: 250-266 (2019) - [j22]Taimin Zhang, Xiaoyu Ji, Zhou Zhuang, Wenyuan Xu:
JamCatcher: A Mobile Jammer Localization Scheme for Advanced Metering Infrastructure in Smart Grid. Sensors 19(4): 909 (2019) - [c50]Yushi Cheng, Xiaoyu Ji, Wenyuan Xu, Hao Pan, Zhuangdi Zhu, Chuang-Wen You, Yi-Chao Chen, Lili Qiu:
MagAttack: Guessing Application Launching and Operation via Smartphone. AsiaCCS 2019: 283-294 - [c49]Yushi Cheng, Xiaoyu Ji, Juchuan Zhang, Wenyuan Xu, Yi-Chao Chen:
DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU. CCS 2019: 1149-1170 - [c48]Chen Yan, Yan Long, Xiaoyu Ji, Wenyuan Xu:
The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification. CCS 2019: 1215-1229 - [c47]Dongliang Xiong, Kai Huang, Siang Chen, Bowen Li, Haitian Jiang, Wenyuan Xu:
NoUCSR: Efficient Super-Resolution Network without Upsampling Convolution. ICCV Workshops 2019: 3378-3387 - [c46]