Xiaoyu Ji
Orcid: 0000-0002-1101-0007Affiliations:
- Zhejiang University, Department of Electrical Engineering, China
- Hong Kong University of Science and Technology, China (PhD)
According to our database1,
Xiaoyu Ji
authored at least 120 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Fast and Lightweight Voice Replay Attack Detection via Time-Frequency Spectrum Difference.
IEEE Internet Things J., September, 2024
Ultrasound Communication Using the Nonlinearity Effect of Microphone Circuits in Smart Devices.
ACM Trans. Sens. Networks, May, 2024
ACM Trans. Sens. Networks, May, 2024
Enrollment-Stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound.
IEEE Internet Things J., April, 2024
IEEE Trans. Mob. Comput., March, 2024
IEEE Internet Things J., January, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Unity is Strength? Benchmarking the Robustness of Fusion-based 3D Object Detection against Physical Sensor Attack.
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
2023
ACM Trans. Sens. Networks, November, 2023
IEEE Trans. Mob. Comput., May, 2023
IEEE/ACM Trans. Netw., April, 2023
No Seeing is Also Believing: Electromagnetic-Emission-Based Application Guessing Attacks via Smartphones.
IEEE Trans. Mob. Comput., 2023
ACM Comput. Surv., 2023
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
AUDIOSENSE: Leveraging Current to Acoustic Channel to Detect Appliances at Single-Point.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
The Silent Manipulator: A Practical and Inaudible Backdoor Attack against Speech Recognition Systems.
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
ACM Trans. Sens. Networks, 2022
IEEE Trans. Mob. Comput., 2022
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication.
IEEE Trans. Inf. Forensics Secur., 2022
Jamming-Resilient Backup Nodes Selection for RPL-based Routing in Smart Grid AMI Networks.
Mob. Networks Appl., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
"OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
MagDefender: Detecting Eavesdropping on Mobile Devices using the Built-in Magnetometer.
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022
OutletGuarder: Detecting DarkSide Ransomware by Power Factor Correction Signals in an Electrical Outlet.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
UltraBD: Backdoor Attack against Automatic Speaker Verification Systems via Adversarial Ultrasound.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022
Power IoT System Security Monitoring Based On Power Consumption Side Channel Information.
Proceedings of the 5th International Conference on Electronics and Electrical Engineering Technology, 2022
2021
ACM Trans. Sens. Networks, 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Internet Things J., 2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
MagThief: Stealing Private App Usage Data on Mobile Devices via Built-in Magnetometer.
Proceedings of the 18th Annual IEEE International Conference on Sensing, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
ACM Trans. Sens. Networks, 2020
ACM Trans. Sens. Networks, 2020
IEEE Trans. Mob. Comput., 2020
ACM Trans. Internet Things, 2020
Sensors, 2020
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the UbiComp/ISWC '20: 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and 2020 ACM International Symposium on Wearable Computers, 2020
ABInfer: A Novel Field Boundaries inference Approach for Protocol Reverse Engineering.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020
2019
ACM Trans. Sens. Networks, 2019
JamCatcher: A Mobile Jammer Localization Scheme for Advanced Metering Infrastructure in Smart Grid.
Sensors, 2019
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2019
AHV-RPL: Jamming-Resilient Backup Nodes Selection for RPL-Based Routing in Smart Grid AMI Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2019
Poster: Secure Visible Light Communication based on Nonlinearity of Spatial Frequency in Light.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Sensors, 2018
Secur. Commun. Networks, 2018
IEEE Internet Things J., 2018
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
IEEE Trans. Mob. Comput., 2017
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IEEE Trans. Wirel. Commun., 2016
IEEE Trans. Mob. Comput., 2016
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016
2015
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015
Tele Adjusting: Using Path Coding and Opportunistic Forwarding for Remote Control in WSNs.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Walking down the STAIRS: Efficient collision resolution for wireless sensor networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
2013
Voice over the dins: Improving wireless channel utilization with collision tolerance.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013
2010
Proceedings of the 4th International Conference on Tangible and Embedded Interaction 2010, 2010
Integrating old chinese shadow play-piying into tangible interaction (abstract only).
Proceedings of the 4th International Conference on Tangible and Embedded Interaction 2010, 2010