Follow
Xiaoyu Ji
Xiaoyu Ji
Verified email at zju.edu.cn - Homepage
Title
Cited by
Cited by
Year
Dolphinatack: Inaudible voice commands
G Zhang, C Yan, X Ji, T Zhang, T Zhang, W Xu
ACM CCS 2017, 2017
9082017
Analyzing and enhancing the security of ultrasonic sensors for autonomous vehicles
W Xu, C Yan, W Jia, X Ji, J Liu
IEEE Internet of Things Journal 5 (6), 5015-5029, 2018
1752018
The catcher in the field: A fieldprint based spoofing detection for text-independent speaker verification
C Yan, Y Long, X Ji, W Xu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
762019
The feasibility of injecting inaudible voice commands to voice assistants
C Yan, G Zhang, X Ji, T Zhang, T Zhang, W Xu
IEEE Transactions on Dependable and Secure Computing 18 (3), 1108-1124, 2019
742019
Fbsleuth: Fake base station forensics via radio frequency fingerprinting
Z Zhuang, X Ji, T Zhang, J Zhang, W Xu, Z Li, Y Liu
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
712018
Energy efficient link-delay aware routing in wireless sensor networks
X Lai, X Ji, X Zhou, L Chen
IEEE Sensors Journal 18 (2), 837-848, 2017
672017
Dewicam: Detecting hidden wireless cameras via smartphones
Y Cheng, X Ji, T Lu, W Xu
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
662018
Poltergeist: Acoustic adversarial machine learning against cameras and computer vision
X Ji, Y Cheng, Y Zhang, K Wang, C Yan, W Xu, K Fu
2021 IEEE Symposium on Security and Privacy (SP), 160-175, 2021
652021
Demicpu: Device fingerprinting with magnetic signals radiated by cpu
Y Cheng, X Ji, J Zhang, W Xu, YC Chen
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
622019
A survey on voice assistant security: Attacks and countermeasures
C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu
ACM Computing Surveys 55 (4), 1-36, 2022
522022
Channel-aware rate adaptation for backscatter networks
W Gong, H Liu, J Liu, X Fan, K Liu, Q Ma, X Ji
IEEE/ACM Transactions on Networking 26 (2), 751-764, 2018
452018
EarArray: Defending against DolphinAttack via Acoustic Attenuation.
G Zhang, X Ji, X Li, G Qu, W Xu
NDSS, 2021
422021
Walking down the STAIRS: Efficient collision resolution for wireless sensor networks
X Ji, Y He, J Wang, W Dong, X Wu, Y Liu
INFOCOM, 2014 Proceedings IEEE, 961 - 969, 2014
402014
Rolling colors: Adversarial laser exploits against traffic light recognition
C Yan, Z Xu, Z Yin, S Mangard, X Ji, W Xu, K Zhao, Y Zhou, T Wang, G Gu, ...
31st USENIX Security Symposium (USENIX Security 22), 1957-1974, 2022
382022
Pla-lidar: Physical laser attacks against lidar-based 3d object detection in autonomous vehicle
Z Jin, X Ji, Y Cheng, B Yang, C Yan, W Xu
2023 IEEE Symposium on Security and Privacy (SP), 1822-1839, 2023
372023
Privacy-aware High-Quality Map Generation with Participatory Sensing
X Chen, X Wu, XY Li, X JI, Y He, Y Liu
Mobile Computing, IEEE Transactions on, 1, 2015
352015
Capspeaker: Injecting voices to microphones via capacitors
X Ji, J Zhang, S Jiang, J Li, W Xu
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
282021
Magattack: Guessing application launching and operation via smartphone
Y Cheng, X Ji, W Xu, H Pan, Z Zhu, CW You, YC Chen, L Qiu
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
282019
On detecting hidden wireless cameras: A traffic pattern-based approach
Y Cheng, X Ji, T Lu, W Xu
IEEE Transactions on Mobile Computing 19 (4), 907-921, 2019
282019
Music-touch shoes: vibrotactile interface for hearing impaired dancers
L Yao, Y Shi, H Chi, X Ji, F Ying
TEI '10 Proceedings of the fourth international conference on Tangible …, 2010
282010
The system can't perform the operation now. Try again later.
Articles 1–20