Cong Shi

Orcid: 0000-0002-7599-202X

Affiliations:
  • Rutgers University, New Brunswick, NJ, USA
  • Stevens Institute of Technology, NJ, USA


According to our database1, Cong Shi authored at least 41 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
RF Domain Backdoor Attack on Signal Classification via Stealthy Trigger.
IEEE Trans. Mob. Comput., December, 2024

DisDet: Exploring Detectability of Backdoor Attack on Diffusion Models.
CoRR, 2024

Inaudible Backdoor Attack via Stealthy Frequency Trigger Injection in Audio Spectrogram.
Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, 2024

Practical Adversarial Attack on WiFi Sensing Through Unnoticeable Communication Packet Perturbation.
Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, 2024

2023
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

Privacy Leakage via Unrestricted Motion-Position Sensors in the Age of Virtual Reality: A Study of Snooping Typed Input on Virtual Keyboards.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Passive Vital Sign Monitoring via Facial Vibrations Leveraging AR/VR Headsets.
Proceedings of the 21st Annual International Conference on Mobile Systems, 2023

Poster: Unobtrusively Mining Vital Sign and Embedded Sensitive Info via AR/VR Motion Sensors.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

Poster: Extracting Speech from Subtle Room Object Vibrations Using Remote mmWave Sensing.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

EmoLeak: Smartphone Motions Reveal Emotions.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Stealthy Backdoor Attack on RF Signal Classification.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

FaceReader: Unobtrusively Mining Vital Signs and Vital Sign Embedded Sensitive Info via AR/VR Motion Sensors.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Privacy Leakage via Speech-induced Vibrations on Room Objects through Remote Sensing based on Phased-MIMO.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Enabling Secret Key Distribution Over Screen-to-Camera Channel Leveraging Color Shift Property.
IEEE Trans. Mob. Comput., 2022

EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers.
CoRR, 2022

Solving the WiFi Sensing Dilemma in Reality Leveraging Conformal Prediction.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

Personalized health monitoring via vital sign measurements leveraging motion sensors on AR/VR headsets.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

Speech privacy attack via vibrations from room objects leveraging a phased-MIMO radar.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

Continuous blood pressure monitoring using low-cost motion sensors on AR/VR headsets.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

Audio-domain position-independent backdoor attack via unnoticeable triggers.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

Defending against Thru-barrier Stealthy Voice Attacks via Cross-Domain Sensing on Phoneme Sounds.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNN.
Proceedings of the Computer Vision - ECCV 2022, 2022

2021
Real-time, Robust and Adaptive Universal Adversarial Attacks Against Speaker Recognition Systems.
J. Signal Process. Syst., 2021

WiFi-Enabled User Authentication through Deep Learning in Daily Activities.
ACM Trans. Internet Things, 2021

Authentication of Voice Commands by Leveraging Vibrations in Wearables.
IEEE Secur. Priv., 2021

Face-Mic: inferring live speech and speaker identity via subtle facial dynamics captured by AR/VR motion sensors.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

Environment-independent In-baggage Object Identification Using WiFi Signals.
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021

Robust Detection of Machine-induced Audio Attacks in Intelligent Audio Systems with Microphone Array.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Enabling Fast and Universal Audio Adversarial Attack Using Generative Model.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
WearID: Wearable-Assisted Low-Effort Authentication to Voice Assistants using Cross-Domain Speech Similarity.
CoRR, 2020

Practical Adversarial Attacks Against Speaker Recognition Systems.
Proceedings of the HotMobile '20: The 21st International Workshop on Mobile Computing Systems and Applications, 2020

Towards Environment-independent Behavior-based User Authentication Using WiFi.
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020

Mobile Device Usage Recommendation based on User Context Inference Using Embedded Sensors.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

Real-Time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
CardioCam: Leveraging Camera on Mobile Devices to Verify Users While Their Heart is Pumping.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Demo: Device-free Activity Monitoring Through Real-time Analysis on Prevalent WiFi Signals.
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019

2018
Device-free Personalized Fitness Assistant Using WiFi.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

2017
WiFi-Enabled Smart Human Dynamics Monitoring.
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017

Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT.
Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017

Secret key distribution leveraging color shift over visible light channel.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017


  Loading...