Dolphinatack: Inaudible voice commands G Zhang, C Yan, X Ji, T Zhang, T Zhang, W Xu ACM CCS 2017, 2017 | 908 | 2017 |
Analyzing and enhancing the security of ultrasonic sensors for autonomous vehicles W Xu, C Yan, W Jia, X Ji, J Liu IEEE Internet of Things Journal 5 (6), 5015-5029, 2018 | 175 | 2018 |
The catcher in the field: A fieldprint based spoofing detection for text-independent speaker verification C Yan, Y Long, X Ji, W Xu Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 76 | 2019 |
The feasibility of injecting inaudible voice commands to voice assistants C Yan, G Zhang, X Ji, T Zhang, T Zhang, W Xu IEEE Transactions on Dependable and Secure Computing 18 (3), 1108-1124, 2019 | 74 | 2019 |
Fbsleuth: Fake base station forensics via radio frequency fingerprinting Z Zhuang, X Ji, T Zhang, J Zhang, W Xu, Z Li, Y Liu Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 71 | 2018 |
Energy efficient link-delay aware routing in wireless sensor networks X Lai, X Ji, X Zhou, L Chen IEEE Sensors Journal 18 (2), 837-848, 2017 | 67 | 2017 |
Dewicam: Detecting hidden wireless cameras via smartphones Y Cheng, X Ji, T Lu, W Xu Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 66 | 2018 |
Poltergeist: Acoustic adversarial machine learning against cameras and computer vision X Ji, Y Cheng, Y Zhang, K Wang, C Yan, W Xu, K Fu 2021 IEEE Symposium on Security and Privacy (SP), 160-175, 2021 | 65 | 2021 |
Demicpu: Device fingerprinting with magnetic signals radiated by cpu Y Cheng, X Ji, J Zhang, W Xu, YC Chen Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 62 | 2019 |
A survey on voice assistant security: Attacks and countermeasures C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu ACM Computing Surveys 55 (4), 1-36, 2022 | 52 | 2022 |
Channel-aware rate adaptation for backscatter networks W Gong, H Liu, J Liu, X Fan, K Liu, Q Ma, X Ji IEEE/ACM Transactions on Networking 26 (2), 751-764, 2018 | 45 | 2018 |
EarArray: Defending against DolphinAttack via Acoustic Attenuation. G Zhang, X Ji, X Li, G Qu, W Xu NDSS, 2021 | 42 | 2021 |
Walking down the STAIRS: Efficient collision resolution for wireless sensor networks X Ji, Y He, J Wang, W Dong, X Wu, Y Liu INFOCOM, 2014 Proceedings IEEE, 961 - 969, 2014 | 40 | 2014 |
Rolling colors: Adversarial laser exploits against traffic light recognition C Yan, Z Xu, Z Yin, S Mangard, X Ji, W Xu, K Zhao, Y Zhou, T Wang, G Gu, ... 31st USENIX Security Symposium (USENIX Security 22), 1957-1974, 2022 | 38 | 2022 |
Pla-lidar: Physical laser attacks against lidar-based 3d object detection in autonomous vehicle Z Jin, X Ji, Y Cheng, B Yang, C Yan, W Xu 2023 IEEE Symposium on Security and Privacy (SP), 1822-1839, 2023 | 37 | 2023 |
Privacy-aware High-Quality Map Generation with Participatory Sensing X Chen, X Wu, XY Li, X JI, Y He, Y Liu Mobile Computing, IEEE Transactions on, 1, 2015 | 35 | 2015 |
Capspeaker: Injecting voices to microphones via capacitors X Ji, J Zhang, S Jiang, J Li, W Xu Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 28 | 2021 |
Magattack: Guessing application launching and operation via smartphone Y Cheng, X Ji, W Xu, H Pan, Z Zhu, CW You, YC Chen, L Qiu Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019 | 28 | 2019 |
On detecting hidden wireless cameras: A traffic pattern-based approach Y Cheng, X Ji, T Lu, W Xu IEEE Transactions on Mobile Computing 19 (4), 907-921, 2019 | 28 | 2019 |
Music-touch shoes: vibrotactile interface for hearing impaired dancers L Yao, Y Shi, H Chi, X Ji, F Ying TEI '10 Proceedings of the fourth international conference on Tangible …, 2010 | 28 | 2010 |