Zhongjie Ba
Orcid: 0000-0003-0921-8869
According to our database1,
Zhongjie Ba
authored at least 65 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE/ACM Trans. Netw., October, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations.
IEEE Trans. Dependable Secur. Comput., 2024
RedAgent: Red Teaming Large Language Models with Context-aware Autonomous Language Agent.
CoRR, 2024
Releasing Malevolence from Benevolence: The Menace of Benign Data on Machine Unlearning.
CoRR, 2024
CoRR, 2024
FaceObfuscator: Defending Deep Learning-based Privacy Attacks with Gradient Descent-resistant Features in Face Recognition.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition.
Proceedings of the 33rd USENIX Security Symposium, 2024
MicGuard: A Comprehensive Detection System against Out-of-band Injection Attacks for Different Level Microphone-based Devices.
Proceedings of the 33rd USENIX Security Symposium, 2024
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 29th International Conference on Intelligent User Interfaces, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., March, 2023
IEEE Trans. Inf. Forensics Secur., 2023
Device-Independent Smartphone Eavesdropping Jointly Using Accelerometer and Gyroscope.
IEEE Trans. Dependable Secur. Comput., 2023
VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2023
SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution.
CoRR, 2023
Proceedings of the ACM Web Conference 2023, 2023
MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
FingerFaker: Spoofing Attack on COTS Fingerprint Recognition Without Victim's Knowledge.
Proceedings of the 21st ACM Conference on Embedded Networked Sensor Systems, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
BypTalker: An Adaptive Adversarial Example Attack to Bypass Prefilter-enabled Speaker Recognition.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Shift to Your Device: Data Augmentation for Device-Independent Speaker Verification Anti-Spoofing.
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022
CamRadar: Hidden Camera Detection Leveraging Amplitude-modulated Sensor Images Embedded in Electromagnetic Emanations.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022
MobiScan: An enhanced invisible screen-camera communication system for IoT applications.
Trans. Emerg. Telecommun. Technol., 2022
CoRR, 2022
CoRR, 2022
Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022
A non-intrusive and adaptive speaker de-identification scheme using adversarial examples.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022
mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric Effect.
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition.
Proceedings of the IEEE INFOCOM 2022, 2022
ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2021
Wavoice: A Noise-resistant Multi-modal Speech Recognition System Fusing mmWave and Audio Signals.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021
PassFace: Enabling Practical Anti-Spoofing Facial Recognition with Camera Fingerprinting.
Proceedings of the ICC 2021, 2021
2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
Automating CSI Measurement with UAVs: from Problem Formulation to Energy-Optimal Solution.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Addressing Smartphone-Based Multi-factor Authentication via Hardware-Rooted Technologies.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
2016
My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Resource Constrained Data Stream Clustering with Concept Drifting for Processing Sensor Data.
Int. J. Data Warehous. Min., 2015
2013
Proceedings of the 2013 10th Web Information System and Application Conference, 2013
Proceedings of the 2013 International Conference on Cloud and Service Computing, 2013