Wenyuan Xu
Orcid: 0000-0002-5043-9148Affiliations:
- Zhejiang University, China
According to our database1,
Wenyuan Xu
authored at least 180 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Fast and Lightweight Voice Replay Attack Detection via Time-Frequency Spectrum Difference.
IEEE Internet Things J., September, 2024
Ultrasound Communication Using the Nonlinearity Effect of Microphone Circuits in Smart Devices.
ACM Trans. Sens. Networks, May, 2024
ACM Trans. Sens. Networks, May, 2024
Res-DFNN: An NN-Based Device Fingerprint Extraction Method Using Network Packet Data.
Symmetry, April, 2024
Enrollment-Stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound.
IEEE Internet Things J., April, 2024
IEEE Trans. Mob. Comput., March, 2024
A 3C Authentication: A Cross-Domain, Certificateless, and Consortium-Blockchain-Based Authentication Method for Vehicle-to-Grid Networks in a Smart Grid.
Symmetry, March, 2024
IEEE Internet Things J., January, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Scoring Metrics of Assessing Voiceprint Distinctiveness Based on Speech Content and Rate.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer.
CoRR, 2024
RAGLAB: A Modular and Research-Oriented Unified Framework for Retrieval-Augmented Generation.
CoRR, 2024
Unity is Strength? Benchmarking the Robustness of Fusion-based 3D Object Detection against Physical Sensor Attack.
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Sophon: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Protego: Detecting Adversarial Examples for Vision Transformers via Intrinsic Capabilities.
Proceedings of the IEEE International Conference on Metaverse Computing, 2024
Adversarial for Good - Defending Training Data Privacy with Adversarial Attack Wisdom.
Proceedings of the IEEE International Conference on Metaverse Computing, 2024
Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
Legilimens: Practical and Unified Content Moderation for Large Language Model Services.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
LAMPS '24: ACM CCS Workshop on Large AI Systems and Models with Privacy and Safety Analysis.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Wirel. Commun., December, 2023
ACM Trans. Sens. Networks, November, 2023
Joint Architecture Design and Workload Partitioning for DNN Inference on Industrial IoT Clusters.
ACM Trans. Internet Techn., 2023
No Seeing is Also Believing: Electromagnetic-Emission-Based Application Guessing Attacks via Smartphones.
IEEE Trans. Mob. Comput., 2023
ACM Comput. Surv., 2023
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
The Silent Manipulator: A Practical and Inaudible Backdoor Attack against Speech Recognition Systems.
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Attack Detection for Distributed Photovoltaic Generation Systems Leveraging Cyber and Power Side Channel Data.
Proceedings of the IEEE PES Innovative Smart Grid Technologies - Asia, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
ACM Trans. Sens. Networks, 2022
IEEE Trans. Mob. Comput., 2022
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication.
IEEE Trans. Inf. Forensics Secur., 2022
Jamming-Resilient Backup Nodes Selection for RPL-based Routing in Smart Grid AMI Networks.
Mob. Networks Appl., 2022
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
"OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
OutletGuarder: Detecting DarkSide Ransomware by Power Factor Correction Signals in an Electrical Outlet.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
UltraBD: Backdoor Attack against Automatic Speaker Verification Systems via Adversarial Ultrasound.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022
Power IoT System Security Monitoring Based On Power Consumption Side Channel Information.
Proceedings of the 5th International Conference on Electronics and Electrical Engineering Technology, 2022
FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE Wirel. Commun., 2021
ACM Trans. Sens. Networks, 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Internet Things J., 2021
Channel pruning guided by spatial and channel attention for DNNs in intelligent edge computing.
Appl. Soft Comput., 2021
Accelerating Federated Learning for IoT in Big Data Analytics With Pruning, Quantization and Selective Updating.
IEEE Access, 2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
ACM Trans. Sens. Networks, 2020
ACM Trans. Sens. Networks, 2020
ACMNet: Adaptive Confidence Matching Network for Human Behavior Analysis via Cross-modal Retrieval.
ACM Trans. Multim. Comput. Commun. Appl., 2020
IEEE Trans. Mob. Comput., 2020
ACM Trans. Internet Things, 2020
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
Sensors, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
2019
JamCatcher: A Mobile Jammer Localization Scheme for Advanced Metering Infrastructure in Smart Grid.
Sensors, 2019
Comput. Biol. Medicine, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2019
AHV-RPL: Jamming-Resilient Backup Nodes Selection for RPL-Based Routing in Smart Grid AMI Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision Workshops, 2019
The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Trans. Dependable Secur. Comput., 2018
Sensors, 2018
Secur. Commun. Networks, 2018
IEEE Internet Things J., 2018
CoRR, 2018
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018
Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers.
Frontiers Inf. Technol. Electron. Eng., 2017
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017
WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
Energy-Efficient Time Synchronization in Wireless Sensor Networks via Temperature-Aware Compensation.
ACM Trans. Sens. Networks, 2016
IEEE Trans. Inf. Forensics Secur., 2016
Frontiers Inf. Technol. Electron. Eng., 2016
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 11th IEEE International Conference on Control & Automation, 2014
Three-dimensional formation merging control of second-order agents under directed and switching topologies.
Proceedings of the 11th IEEE International Conference on Control & Automation, 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
ACM HotMobile 2013 poster: leveraging imperfections of sensors for fingerprinting smartphones.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2013
WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices.
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
2012
IEEE Trans. Parallel Distributed Syst., 2012
Enhancing Sink-Location Privacy in Wireless Sensor Networks through <i>k</i>-Anonymity.
Int. J. Distributed Sens. Networks, 2012
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012
Proceedings of the 51th IEEE Conference on Decision and Control, 2012
Neighborhood watch: security and privacy analysis of automatic meter reading systems.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Wirel. Networks, 2011
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011
2010
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study.
Proceedings of the 19th USENIX Security Symposium, 2010
Distributed Transmit Beamforming with Autonomous and Self-Organizing Mobile Antennas.
Proceedings of the Global Communications Conference, 2010
Proceedings of the Distributed Computing in Sensor Systems, 2010
2009
ACM Trans. Sens. Networks, 2009
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
2008
Defending wireless sensor networks from radio interference through channel adaptation.
ACM Trans. Sens. Networks, 2008
Proceedings of the First ACM Conference on Wireless Network Security, 2008
2007
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007
Proceedings of the 6th International Conference on Information Processing in Sensor Networks, 2007
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007
2006
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006
2005
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005
2004
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004