Yushi Cheng

Orcid: 0000-0002-0888-2322

According to our database1, Yushi Cheng authored at least 36 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Fast and Lightweight Voice Replay Attack Detection via Time-Frequency Spectrum Difference.
IEEE Internet Things J., September, 2024

Evaluating Compressive Sensing on the Security of Computer Vision Systems.
ACM Trans. Sens. Networks, May, 2024

Enrollment-Stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound.
IEEE Internet Things J., April, 2024

On Tracing Screen Photos - A Moiré Pattern-Based Approach.
IEEE Trans. Dependable Secur. Comput., 2024

Scoring Metrics of Assessing Voiceprint Distinctiveness Based on Speech Content and Rate.
IEEE Trans. Dependable Secur. Comput., 2024

Adversarial Computer Vision via Acoustic Manipulation of Camera Sensors.
IEEE Trans. Dependable Secur. Comput., 2024

Unity is Strength? Benchmarking the Robustness of Fusion-based 3D Object Detection against Physical Sensor Attack.
Proceedings of the ACM on Web Conference 2024, 2024

Understanding and Benchmarking the Commonality of Adversarial Examples.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

CamPro: Camera-based Anti-Facial Recognition.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

UniID: Spoofing Face Authentication System by Universal Identity.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

2023
PDGes: An Interpretable Detection Model for Parkinson's Disease Using Smartphones.
ACM Trans. Sens. Networks, November, 2023

No Seeing is Also Believing: Electromagnetic-Emission-Based Application Guessing Attacks via Smartphones.
IEEE Trans. Mob. Comput., 2023

Exploring Adversarial Robustness of LiDAR-Camera Fusion Model in Autonomous Driving.
CoRR, 2023

TPatch: A Triggered Physical Adversarial Patch.
Proceedings of the 32nd USENIX Security Symposium, 2023

CAPatch: Physical Adversarial Patch against Image Captioning Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023

DepthFake: Spoofing 3D Face Authentication with a 2D Photo.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Device Fingerprinting with Magnetic Induction Signals Radiated by CPU Modules.
ACM Trans. Sens. Networks, 2022

"OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score.
Proceedings of the 31st USENIX Security Symposium, 2022

OutletGuarder: Detecting DarkSide Ransomware by Power Factor Correction Signals in an Electrical Outlet.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

UltraBD: Backdoor Attack against Automatic Speaker Verification Systems via Adversarial Ultrasound.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

A Small Sticker is Enough: Spoofing Face Recognition Systems via Small Stickers.
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022

2021
mID: Tracing Screen Photos via Moiré Patterns.
Proceedings of the 30th USENIX Security Symposium, 2021

Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
Identifying Child Users via Touchscreen Interactions.
ACM Trans. Sens. Networks, 2020

On Detecting Hidden Wireless Cameras: A Traffic Pattern-based Approach.
IEEE Trans. Mob. Comput., 2020

2019
DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

MagAttack: Guessing Application Launching and Operation via Smartphone.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Pido: Predictive Delay Optimization for Intertidal Wireless Sensor Networks.
Sensors, 2018

User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes.
Secur. Commun. Networks, 2018

iCare: Automatic and User-friendly Child Identification on Smartphones.
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018

Cyber-Attack Classification in Smart Grid via Deep Neural Network.
Proceedings of the 2nd International Conference on Computer Science and Application Engineering, 2018

DeWiCam: Detecting Hidden Wireless Cameras via Smartphones.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
SADO: State-associated and delay-oriented data collection for intertidal WSNs.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

HomeSpy: Inferring User Presence via Encrypted Traffic of Home Surveillance Camera.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

2003
A Web-Based Intelligent Forecasting System.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2003


  Loading...