Zhongjie Ba

Orcid: 0000-0003-0921-8869

According to our database1, Zhongjie Ba authored at least 65 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Imperceptible Eavesdropping Attack on WiFi Sensing Systems.
IEEE/ACM Trans. Netw., October, 2024

FLTracer: Accurate Poisoning Attack Provenance in Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

PhaDe: Practical Phantom Spoofing Attack Detection for Autonomous Vehicles.
IEEE Trans. Inf. Forensics Secur., 2024

AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception.
IEEE Trans. Inf. Forensics Secur., 2024

Indelible "Footprints" of Inaudible Command Injection.
IEEE Trans. Inf. Forensics Secur., 2024

MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning.
IEEE Trans. Dependable Secur. Comput., 2024

High-Quality Speech Recovery Through Soundproof Protections via mmWave Sensing.
IEEE Trans. Dependable Secur. Comput., 2024

UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations.
IEEE Trans. Dependable Secur. Comput., 2024

RedAgent: Red Teaming Large Language Models with Context-aware Autonomous Language Agent.
CoRR, 2024

Releasing Malevolence from Benevolence: The Menace of Benign Data on Machine Unlearning.
CoRR, 2024

Do As I Do: Pose Guided Human Motion Copy.
CoRR, 2024

Phoneme-Based Proactive Anti-Eavesdropping with Controlled Recording Privilege.
CoRR, 2024

FaceObfuscator: Defending Deep Learning-based Privacy Attacks with Gradient Descent-resistant Features in Face Recognition.
Proceedings of the 33rd USENIX Security Symposium, 2024

Devil in the Room: Triggering Audio Backdoors in the Physical World.
Proceedings of the 33rd USENIX Security Symposium, 2024

FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition.
Proceedings of the 33rd USENIX Security Symposium, 2024

MicGuard: A Comprehensive Detection System against Out-of-band Injection Attacks for Different Level Microphone-based Devices.
Proceedings of the 33rd USENIX Security Symposium, 2024

Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Conan's Bow Tie: A Streaming Voice Conversion for Real-Time VTuber Livestreaming.
Proceedings of the 29th International Conference on Intelligent User Interfaces, 2024

Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., March, 2023

AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake.
IEEE Trans. Inf. Forensics Secur., 2023

Device-Independent Smartphone Eavesdropping Jointly Using Accelerometer and Gyroscope.
IEEE Trans. Dependable Secur. Comput., 2023

VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2023

SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution.
CoRR, 2023

Masked Diffusion Models are Fast Learners.
CoRR, 2023

Transferring Audio Deepfake Detection Capability across Languages.
Proceedings of the ACM Web Conference 2023, 2023

MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

FingerFaker: Spoofing Attack on COTS Fingerprint Recognition Without Victim's Knowledge.
Proceedings of the 21st ACM Conference on Embedded Networked Sensor Systems, 2023

InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

BypTalker: An Adaptive Adversarial Example Attack to Bypass Prefilter-enabled Speaker Recognition.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023

Locate and Verify: A Two-Stream Network for Improved Deepfake Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Is Imitation All You Need? Generalized Decision-Making with Dual-Phase Training.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Shift to Your Device: Data Augmentation for Device-Independent Speaker Verification Anti-Spoofing.
Proceedings of the IEEE International Conference on Acoustics, 2023

FITS: Matching Camera Fingerprints Subject to Software Noise Pollution.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

CamRadar: Hidden Camera Detection Leveraging Amplitude-modulated Sensor Images Embedded in Electromagnetic Emanations.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

MobiScan: An enhanced invisible screen-camera communication system for IoT applications.
Trans. Emerg. Telecommun. Technol., 2022

Masked Autoencoders for Egocentric Video Understanding @ Ego4D Challenge 2022.
CoRR, 2022

Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples.
CoRR, 2022

Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

A non-intrusive and adaptive speaker de-identification scheme using adversarial examples.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric Effect.
Proceedings of the IEEE INFOCOM 2022, 2022

InertiEAR: Automatic and Device-independent IMU-based Eavesdropping on Smartphones.
Proceedings of the IEEE INFOCOM 2022, 2022

PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition.
Proceedings of the IEEE INFOCOM 2022, 2022

ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Poster: Cryptographic Inferences for Video Deep Neural Networks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2021

Wavoice: A Noise-resistant Multi-modal Speech Recognition System Fusing mmWave and Audio Signals.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021

PassFace: Enabling Practical Anti-Spoofing Facial Recognition with Camera Fingerprinting.
Proceedings of the ICC 2021, 2021

2020
Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Accelerometer-based smartphone eavesdropping.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020

2019
Toward Hardware-Rooted Smartphone Authentication.
IEEE Wirel. Commun., 2019

CIM: Camera in Motion for Smartphone Authentication.
IEEE Trans. Inf. Forensics Secur., 2019

Automating CSI Measurement with UAVs: from Problem Formulation to Energy-Optimal Solution.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

CFP: Enabling Camera Fingerprint Concealment for Privacy-Preserving Image Sharing.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

2018
ABC: Enabling Smartphone Authentication with Built-in Camera.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Defending against Speaker Fingerprinting Based Device Tracking for Smartphones.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Addressing Smartphone-Based Multi-factor Authentication via Hardware-Rooted Technologies.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
Constructing authentication web in cloud computing.
Secur. Commun. Networks, 2016

My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Resource Constrained Data Stream Clustering with Concept Drifting for Processing Sensor Data.
Int. J. Data Warehous. Min., 2015

2013
On the Construction of Trusted Resource Pool in Clouds.
Proceedings of the 2013 10th Web Information System and Application Conference, 2013

Contructing Authentication Web in Cloud Computing.
Proceedings of the 2013 International Conference on Cloud and Service Computing, 2013


  Loading...