Xiaoyu Ji

Orcid: 0000-0002-1101-0007

Affiliations:
  • Zhejiang University, Department of Electrical Engineering, China
  • Hong Kong University of Science and Technology, China (PhD)


According to our database1, Xiaoyu Ji authored at least 120 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fast and Lightweight Voice Replay Attack Detection via Time-Frequency Spectrum Difference.
IEEE Internet Things J., September, 2024

Ultrasound Communication Using the Nonlinearity Effect of Microphone Circuits in Smart Devices.
ACM Trans. Sens. Networks, May, 2024

Evaluating Compressive Sensing on the Security of Computer Vision Systems.
ACM Trans. Sens. Networks, May, 2024

Enrollment-Stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound.
IEEE Internet Things J., April, 2024

MagView++: Data Exfiltration via CPU Magnetic Signals Under Video Decoding.
IEEE Trans. Mob. Comput., March, 2024

Toward Pitch-Insensitive Speaker Verification via Soundfield.
IEEE Internet Things J., January, 2024

Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification.
IEEE Trans. Inf. Forensics Secur., 2024

Dr. Defender: Proactive Detection of Autopilot Drones Based on CSI.
IEEE Trans. Inf. Forensics Secur., 2024

On Tracing Screen Photos - A Moiré Pattern-Based Approach.
IEEE Trans. Dependable Secur. Comput., 2024

Analyzing and Defending GhostTouch Attack Against Capacitive Touchscreens.
IEEE Trans. Dependable Secur. Comput., 2024

CapSpeaker: Injecting Commands to Voice Assistants Via Capacitors.
IEEE Trans. Dependable Secur. Comput., 2024

Marionette: Manipulate Your Touchscreen via a Charging Cable.
IEEE Trans. Dependable Secur. Comput., 2024

Adversarial Computer Vision via Acoustic Manipulation of Camera Sensors.
IEEE Trans. Dependable Secur. Comput., 2024

PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR.
CoRR, 2024

SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models.
CoRR, 2024

Unity is Strength? Benchmarking the Robustness of Fusion-based 3D Object Detection against Physical Sensor Attack.
Proceedings of the ACM on Web Conference 2024, 2024

LaserAdv: Laser Adversarial Attacks on Speech Recognition Systems.
Proceedings of the 33rd USENIX Security Symposium, 2024

Understanding and Benchmarking the Commonality of Adversarial Examples.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

CamPro: Camera-based Anti-Facial Recognition.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

UniID: Spoofing Face Authentication System by Universal Identity.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

2023
PDGes: An Interpretable Detection Model for Parkinson's Disease Using Smartphones.
ACM Trans. Sens. Networks, November, 2023

MagneComm+: Near-Field Electromagnetic Induction Communication With Magnetometer.
IEEE Trans. Mob. Comput., May, 2023

ScreenID: Enhancing QRCode Security by Utilizing Screen Dimming Feature.
IEEE/ACM Trans. Netw., April, 2023

No Seeing is Also Believing: Electromagnetic-Emission-Based Application Guessing Attacks via Smartphones.
IEEE Trans. Mob. Comput., 2023

A Survey on Voice Assistant Security: Attacks and Countermeasures.
ACM Comput. Surv., 2023

Exploring Adversarial Robustness of LiDAR-Camera Fusion Model in Autonomous Driving.
CoRR, 2023

TPatch: A Triggered Physical Adversarial Patch.
Proceedings of the 32nd USENIX Security Symposium, 2023

CAPatch: Physical Adversarial Patch against Image Captioning Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023

Remote Attacks on Speech Recognition Systems Using Sound from Power Supply.
Proceedings of the 32nd USENIX Security Symposium, 2023

Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023

GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI.
Proceedings of the 32nd USENIX Security Symposium, 2023

DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

DepthFake: Spoofing 3D Face Authentication with a 2D Photo.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Volttack: Control IoT Devices by Manipulating Power Supply Voltage.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

AUDIOSENSE: Leveraging Current to Acoustic Channel to Detect Appliances at Single-Point.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023

LeakThief: Stealing the Behavior Information of Laptop via Leakage Current.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023

BitDance: Manipulating UART Serial Communication with IEMI.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

The Silent Manipulator: A Practical and Inaudible Backdoor Attack against Speech Recognition Systems.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

MicPro: Microphone-based Voice Privacy Protection.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Device Fingerprinting with Magnetic Induction Signals Radiated by CPU Modules.
ACM Trans. Sens. Networks, 2022

A Nonlinearity-Based Secure Face-to-Face Device Authentication for Mobile Devices.
IEEE Trans. Mob. Comput., 2022

Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication.
IEEE Trans. Inf. Forensics Secur., 2022

Jamming-Resilient Backup Nodes Selection for RPL-based Routing in Smart Grid AMI Networks.
Mob. Networks Appl., 2022

Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition.
Proceedings of the 31st USENIX Security Symposium, 2022

GhostTouch: Targeted Attacks on Touchscreens without Physical Touch.
Proceedings of the 31st USENIX Security Symposium, 2022

"OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score.
Proceedings of the 31st USENIX Security Symposium, 2022

WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

MagDefender: Detecting Eavesdropping on Mobile Devices using the Built-in Magnetometer.
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022

DoCam: depth sensing with an optical image stabilization supported RGB camera.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

OutletGuarder: Detecting DarkSide Ransomware by Power Factor Correction Signals in an Electrical Outlet.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

UltraBD: Backdoor Attack against Automatic Speaker Verification Systems via Adversarial Ultrasound.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

G-PPG: A Gesture-related PPG-based Two-Factor Authentication for Wearable Devices.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

A Small Sticker is Enough: Spoofing Face Recognition Systems via Small Stickers.
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022

Power IoT System Security Monitoring Based On Power Consumption Side Channel Information.
Proceedings of the 5th International Conference on Electronics and Electrical Engineering Technology, 2022

2021
SenCS: Enabling Real-time Indoor Proximity Verification via Contextual Similarity.
ACM Trans. Sens. Networks, 2021

The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants.
IEEE Trans. Dependable Secur. Comput., 2021

Who is Charging My Phone? Identifying Wireless Chargers via Fingerprinting.
IEEE Internet Things J., 2021

Towards Fortifying the Multi-Factor-Based Online Account Ecosystem.
CoRR, 2021

OutletSpy: cross-outlet application inference via power factor correction signal.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

mID: Tracing Screen Photos via Moiré Patterns.
Proceedings of the 30th USENIX Security Symposium, 2021

Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

MagThief: Stealing Private App Usage Data on Mobile Devices via Built-in Magnetometer.
Proceedings of the 18th Annual IEEE International Conference on Sensing, 2021

EarArray: Defending against DolphinAttack via Acoustic Attenuation.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

ScreenID: Enhancing QRCode Security by Fingerprinting Screens.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Anti-Replay: A Fast and Lightweight Voice Replay Attack Detection System.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

SMS Goes Nuclear: Fortifying SMS-Based MFA in Online Account Ecosystem.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

CapSpeaker: Injecting Voices to Microphones via Capacitors.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
OPCIO: Optimizing Power Consumption for Embedded Devices via GPIO Configuration.
ACM Trans. Sens. Networks, 2020

Identifying Child Users via Touchscreen Interactions.
ACM Trans. Sens. Networks, 2020

On Detecting Hidden Wireless Cameras: A Traffic Pattern-based Approach.
IEEE Trans. Mob. Comput., 2020

Authenticating Smart Home Devices via Home Limited Channels.
ACM Trans. Internet Things, 2020

Power-Based Non-Intrusive Condition Monitoring for Terminal Device in Smart Grid.
Sensors, 2020

Toward a secure QR code system by fingerprinting screens.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020

MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Appliance fingerprinting using sound from power supply.
Proceedings of the UbiComp/ISWC '20: 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and 2020 ACM International Symposium on Wearable Computers, 2020

ABInfer: A Novel Field Boundaries inference Approach for Protocol Reverse Engineering.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

2019
Exploiting Concurrency for Opportunistic Forwarding in Duty-Cycled IoT Networks.
ACM Trans. Sens. Networks, 2019

JamCatcher: A Mobile Jammer Localization Scheme for Advanced Metering Infrastructure in Smart Grid.
Sensors, 2019

UltraComm: High-Speed and Inaudible Acoustic Communication.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2019

AHV-RPL: Jamming-Resilient Backup Nodes Selection for RPL-Based Routing in Smart Grid AMI Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2019

Poster: Secure Visible Light Communication based on Nonlinearity of Spatial Frequency in Light.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

mQRCode: Secure QR Code Using Nonlinearity of Spatial Frequency in Light.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

NAuth: Secure Face-to-Face Device Authentication via Nonlinearity.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

MagAttack: Guessing Application Launching and Operation via Smartphone.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Channel-Aware Rate Adaptation for Backscatter Networks.
IEEE/ACM Trans. Netw., 2018

Pido: Predictive Delay Optimization for Intertidal Wireless Sensor Networks.
Sensors, 2018

LESS: Link Estimation with Sparse Sampling in Intertidal WSNs.
Sensors, 2018

User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes.
Secur. Commun. Networks, 2018

Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles.
IEEE Internet Things J., 2018

Which One to Go: Security and Usability Evaluation of Mid-Air Gestures.
CoRR, 2018

iCare: Automatic and User-friendly Child Identification on Smartphones.
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018

Secure QR Code Scheme Using Nonlinearity of Spatial Frequency.
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018

FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

HlcAuth: Key-free and Secure Communications via Home-Limited Channel.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

DeWiCam: Detecting Hidden Wireless Cameras via Smartphones.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
On Improving Wireless Channel Utilization: A Collision Tolerance-Based Approach.
IEEE Trans. Mob. Comput., 2017

DolphinAtack: Inaudible Voice Commands.
CoRR, 2017

SADO: State-associated and delay-oriented data collection for intertidal WSNs.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

A robust backup routing protocol for neighbor area network in the smart grid.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

En-MAC: Environment-aware MAC protocol for WSNs in intertidal environment.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

MagneComm: Magnetometer-based Near-Field Communication.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

HomeSpy: Inferring User Presence via Encrypted Traffic of Home Surveillance Camera.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

DolphinAttack: Inaudible Voice Commands.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Hitchhike: A Preamble-Based Control Plane for SNR-Sensitive Wireless Networks.
IEEE Trans. Wirel. Commun., 2016

Privacy-Aware High-Quality Map Generation with Participatory Sensing.
IEEE Trans. Mob. Comput., 2016

Furion: Towards Energy-Efficient WiFi Offloading under Link Dynamics.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

MagAttack: remote app sensing with your phone.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2016 ACM International Symposium on Wearable Computers, 2016

2015
COF: Exploiting Concurrency for Low Power Opportunistic Forwarding.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

Tele Adjusting: Using Path Coding and Opportunistic Forwarding for Remote Control in WSNs.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

2014
Hitchhike: Riding control on preambles.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Walking down the STAIRS: Efficient collision resolution for wireless sensor networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Voice over the dins: Improving wireless channel utilization with collision tolerance.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

2010
Music-touch shoes: vibrotactile interface for hearing impaired dancers.
Proceedings of the 4th International Conference on Tangible and Embedded Interaction 2010, 2010

Integrating old chinese shadow play-piying into tangible interaction (abstract only).
Proceedings of the 4th International Conference on Tangible and Embedded Interaction 2010, 2010


  Loading...