default search action
Xiaoyu Ji 0001
Person information
- affiliation: Zhejiang University, Department of Electrical Engineering, China
- affiliation (PhD): Hong Kong University of Science and Technology, China
Other persons with the same name
- Xiaoyu Ji — disambiguation page
- Xiaoyu Ji 0002 — Renmin University of China, School of Business, Beijing, China
- Xiaoyu Ji 0003 — Harbin Institute of Technology, Harbin, China
- Xiaoyu Ji 0004 — Purdue University, West Lafayette, IN, USA
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Xinfeng Li, Zhicong Zheng, Chen Yan, Chaohao Li, Xiaoyu Ji, Wenyuan Xu:
Toward Pitch-Insensitive Speaker Verification via Soundfield. IEEE Internet Things J. 11(1): 1175-1189 (2024) - [j41]Xinfeng Li, Junning Ze, Chen Yan, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
Enrollment-Stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound. IEEE Internet Things J. 11(8): 13108-13124 (2024) - [j40]Ruiwen He, Yushi Cheng, Zhicong Zheng, Xiaoyu Ji, Wenyuan Xu:
Fast and Lightweight Voice Replay Attack Detection via Time-Frequency Spectrum Difference. IEEE Internet Things J. 11(18): 29798-29810 (2024) - [j39]Wenyuan Xu, Yushi Cheng, Xiaoyu Ji, Yi-Chao Chen:
On Tracing Screen Photos - A Moiré Pattern-Based Approach. IEEE Trans. Dependable Secur. Comput. 21(4): 2068-2084 (2024) - [j38]Yan Jiang, Xiaoyu Ji, Juchuan Zhang, Yancheng Jiang, Shui Jiang, Wenyuan Xu:
CapSpeaker: Injecting Commands to Voice Assistants Via Capacitors. IEEE Trans. Dependable Secur. Comput. 21(4): 3295-3308 (2024) - [j37]Yan Jiang, Xiaoyu Ji, Kai Wang, Chen Yan, Richard Mitev, Ahmad-Reza Sadeghi, Wenyuan Xu:
Marionette: Manipulate Your Touchscreen via a Charging Cable. IEEE Trans. Dependable Secur. Comput. 21(4): 3309-3323 (2024) - [j36]Yushi Cheng, Xiaoyu Ji, Wenjun Zhu, Shibo Zhang, Kevin Fu, Wenyuan Xu:
Adversarial Computer Vision via Acoustic Manipulation of Camera Sensors. IEEE Trans. Dependable Secur. Comput. 21(4): 3734-3750 (2024) - [j35]Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu:
Analyzing and Defending GhostTouch Attack Against Capacitive Touchscreens. IEEE Trans. Dependable Secur. Comput. 21(5): 4360-4375 (2024) - [j34]Ruiwen He, Yushi Cheng, Junning Ze, Xinfeng Li, Xiaoyu Ji, Wenyuan Xu:
Scoring Metrics of Assessing Voiceprint Distinctiveness Based on Speech Content and Rate. IEEE Trans. Dependable Secur. Comput. 21(6): 5582-5599 (2024) - [j33]Jiangyi Deng, Xiaoyu Ji, Beibei Wang, Bin Wang, Wenyuan Xu:
Dr. Defender: Proactive Detection of Autopilot Drones Based on CSI. IEEE Trans. Inf. Forensics Secur. 19: 194-206 (2024) - [j32]Xiaoyu Ji, Qinhong Jiang, Chaohao Li, Zhuoyang Shi, Wenyuan Xu:
Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification. IEEE Trans. Inf. Forensics Secur. 19: 3366-3379 (2024) - [j31]Xiaoyu Ji, Juchuan Zhang, Shan Zou, Yi-Chao Chen, Gang Qu, Wenyuan Xu:
MagView++: Data Exfiltration via CPU Magnetic Signals Under Video Decoding. IEEE Trans. Mob. Comput. 23(3): 2486-2503 (2024) - [j30]Guoming Zhang, Xiaoyu Ji, Xinyan Zhou, Donglian Qi, Wenyuan Xu:
Ultrasound Communication Using the Nonlinearity Effect of Microphone Circuits in Smart Devices. ACM Trans. Sens. Networks 20(3): 53:1-53:22 (2024) - [j29]Yushi Cheng, Boyang Zhou, Yanjiao Chen, Yi-Chao Chen, Xiaoyu Ji, Wenyuan Xu:
Evaluating Compressive Sensing on the Security of Computer Vision Systems. ACM Trans. Sens. Networks 20(3): 56:1-56:24 (2024) - [j28]Ruochen Zhou, Xiaoyu Ji, Han Chen, Chen Yan, Wenyuan Xu:
Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation. ACM Trans. Sens. Networks 20(6): 127:1-127:26 (2024) - [c77]Qingsong Yao, Yuming Liu, Xiongjia Sun, Xuewen Dong, Xiaoyu Ji, Jianfeng Ma:
Watch the Rhythm: Breaking Privacy with Accelerometer at the Extremely-Low Sampling Rate of 5Hz. CCS 2024: 1776-1790 - [c76]Xinfeng Li, Kai Li, Yifan Zheng, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
SafeEar: Content Privacy-Preserving Audio Deepfake Detection. CCS 2024: 3585-3599 - [c75]Xinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan, Yanjiao Chen, Xiaoyu Ji, Wenyuan Xu:
SafeGen: Mitigating Sexually Explicit Content Generation in Text-to-Image Models. CCS 2024: 4807-4821 - [c74]Qinhong Jiang, Yanze Ren, Yan Long, Chen Yan, Yumai Sun, Xiaoyu Ji, Kevin Fu, Wenyuan Xu:
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards. NDSS 2024 - [c73]Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu:
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time. NDSS 2024 - [c72]Yan Long, Qinhong Jiang, Chen Yan, Tobias Alam, Xiaoyu Ji, Wenyuan Xu, Kevin Fu:
EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras. NDSS 2024 - [c71]Zhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji, Wenyuan Xu:
UniID: Spoofing Face Authentication System by Universal Identity. NDSS 2024 - [c70]Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
CamPro: Camera-based Anti-Facial Recognition. NDSS 2024 - [c69]Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu:
Understanding and Benchmarking the Commonality of Adversarial Examples. SP 2024: 1665-1683 - [c68]Guoming Zhang, Xiaohui Ma, Huiting Zhang, Zhijie Xiang, Xiaoyu Ji, Yanni Yang, Xiuzhen Cheng, Pengfei Hu:
LaserAdv: Laser Adversarial Attacks on Speech Recognition Systems. USENIX Security Symposium 2024 - [c67]Zizhi Jin, Xuancun Lu, Bo Yang, Yushi Cheng, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
Unity is Strength? Benchmarking the Robustness of Fusion-based 3D Object Detection against Physical Sensor Attack. WWW 2024: 3031-3042 - [i13]Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu:
TPatch: A Triggered Physical Adversarial Patch. CoRR abs/2401.00148 (2024) - [i12]Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
CamPro: Camera-based Anti-Facial Recognition. CoRR abs/2401.00151 (2024) - [i11]Xinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan, Yanjiao Chen, Xiaoyu Ji, Wenyuan Xu:
SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models. CoRR abs/2404.06666 (2024) - [i10]Xinfeng Li, Kai Li, Yifan Zheng, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
SafeEar: Content Privacy-Preserving Audio Deepfake Detection. CoRR abs/2409.09272 (2024) - [i9]Zizhi Jin, Qinhong Jiang, Xuancun Lu, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR. CoRR abs/2409.17907 (2024) - [i8]Xuancun Lu, Zhengxian Huang, Xinfeng Li, Xiaoyu Ji, Wenyuan Xu:
POEX: Policy Executable Embodied AI Jailbreak Attacks. CoRR abs/2412.16633 (2024) - 2023
- [j27]Chen Yan, Xiaoyu Ji, Kai Wang, Qinhong Jiang, Zizhi Jin, Wenyuan Xu:
A Survey on Voice Assistant Security: Attacks and Countermeasures. ACM Comput. Surv. 55(4): 84:1-84:36 (2023) - [j26]Xiaoyu Ji, Yushi Cheng, Wenyuan Xu, Yuehan Chi, Hao Pan, Zhuangdi Zhu, Chuang-Wen You, Yi-Chao Chen, Lili Qiu:
No Seeing is Also Believing: Electromagnetic-Emission-Based Application Guessing Attacks via Smartphones. IEEE Trans. Mob. Comput. 22(2): 1095-1109 (2023) - [j25]Guangtao Xue, Hao Pan, Yi-Chao Chen, Xiaoyu Ji, Jiadi Yu:
MagneComm+: Near-Field Electromagnetic Induction Communication With Magnetometer. IEEE Trans. Mob. Comput. 22(5): 2789-2801 (2023) - [j24]Guangtao Xue, Yijie Li, Hao Pan, Lanqing Yang, Yi-Chao Chen, Xiaoyu Ji, Jiadi Yu:
ScreenID: Enhancing QRCode Security by Utilizing Screen Dimming Feature. IEEE/ACM Trans. Netw. 31(2): 862-876 (2023) - [j23]Yanjiao Chen, Yushi Cheng, Xiaoyu Ji, Boyang Zhou, Wenyuan Xu, Fei Teng:
PDGes: An Interpretable Detection Model for Parkinson's Disease Using Smartphones. ACM Trans. Sens. Networks 19(4): 77:1-77:21 (2023) - [c66]Shilin Xiao, Xiaoyu Ji, Chen Yan, Zhicong Zheng, Wenyuan Xu:
MicPro: Microphone-based Voice Privacy Protection. CCS 2023: 1302-1316 - [c65]Zhicong Zheng, Xinfeng Li, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
The Silent Manipulator: A Practical and Inaudible Backdoor Attack against Speech Recognition Systems. ACM Multimedia 2023: 7849-7858 - [c64]Zhixin Xie, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
BitDance: Manipulating UART Serial Communication with IEMI. RAID 2023: 63-76 - [c63]Dian Ding, Yi-Chao Chen, Xiaoyu Ji, Guangtao Xue:
LeakThief: Stealing the Behavior Information of Laptop via Leakage Current. SECON 2023: 186-194 - [c62]Yijie Li, Xiatong Tong, Qianfei Ren, Qingyang Li, Lanqing Yang, Yi-Chao Chen, Guangtao Xue, Xiaoyu Ji, Jiadi Yu:
AUDIOSENSE: Leveraging Current to Acoustic Channel to Detect Appliances at Single-Point. SECON 2023: 240-248 - [c61]Zhihao Wu, Yushi Cheng, Jiahui Yang, Xiaoyu Ji, Wenyuan Xu:
DepthFake: Spoofing 3D Face Authentication with a 2D Photo. SP 2023: 917-91373 - [c60]Kai Wang, Shilin Xiao, Xiaoyu Ji, Chen Yan, Chaohao Li, Wenyuan Xu:
Volttack: Control IoT Devices by Manipulating Power Supply Voltage. SP 2023: 1771-1788 - [c59]Zizhi Jin, Xiaoyu Ji, Yushi Cheng, Bo Yang, Chen Yan, Wenyuan Xu:
PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle. SP 2023: 1822-1839 - [c58]Ruochen Zhou, Xiaoyu Ji, Chen Yan, Yi-Chao Chen, Wenyuan Xu, Chaohao Li:
DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation. SP 2023: 3113-3128 - [c57]Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu:
TPatch: A Triggered Physical Adversarial Patch. USENIX Security Symposium 2023: 661-678 - [c56]Shibo Zhang, Yushi Cheng, Wenjun Zhu, Xiaoyu Ji, Wenyuan Xu:
CAPatch: Physical Adversarial Patch against Image Captioning Systems. USENIX Security Symposium 2023: 679-696 - [c55]Xinfeng Li, Xiaoyu Ji, Chen Yan, Chaohao Li, Yichen Li, Zhenning Zhang, Wenyuan Xu:
Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks. USENIX Security Symposium 2023: 2455-2472 - [c54]Lanqing Yang, Xinqi Chen, Xiangyong Jian, Leping Yang, Yijie Li, Qianfei Ren, Yi-Chao Chen, Guangtao Xue, Xiaoyu Ji:
Remote Attacks on Speech Recognition Systems Using Sound from Power Supply. USENIX Security Symposium 2023: 4571-4588 - [c53]Qinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou, Wenyuan Xu:
GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI. USENIX Security Symposium 2023: 7249-7266 - [i7]Xinfeng Li, Junning Ze, Chen Yan, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound. CoRR abs/2306.16022 (2023) - [i6]Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu:
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time. CoRR abs/2308.01040 (2023) - [i5]Bo Yang, Xiaoyu Ji, Zizhi Jin, Yushi Cheng, Wenyuan Xu:
Exploring Adversarial Robustness of LiDAR-Camera Fusion Model in Autonomous Driving. CoRR abs/2312.01468 (2023) - 2022
- [j22]Taimin Zhang, Xiaoyu Ji, Wenyuan Xu:
Jamming-Resilient Backup Nodes Selection for RPL-based Routing in Smart Grid AMI Networks. Mob. Networks Appl. 27(1): 329-342 (2022) - [j21]Jiayu Zhang, Min Li, Min-Jian Zhao, Xiaoyu Ji, Wenyuan Xu:
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication. IEEE Trans. Inf. Forensics Secur. 17: 1528-1543 (2022) - [j20]Xiaoyu Ji, Xinyan Zhou, Chen Yan, Jiangyi Deng, Wenyuan Xu:
A Nonlinearity-Based Secure Face-to-Face Device Authentication for Mobile Devices. IEEE Trans. Mob. Comput. 21(4): 1155-1171 (2022) - [j19]Xiaoyu Ji, Yushi Cheng, Juchuan Zhang, Yuehan Chi, Wenyuan Xu, Yi-Chao Chen:
Device Fingerprinting with Magnetic Induction Signals Radiated by CPU Modules. ACM Trans. Sens. Networks 18(2): 23:1-23:28 (2022) - [c52]Jiachang Wen, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
Power IoT System Security Monitoring Based On Power Consumption Side Channel Information. EEET 2022: 59-65 - [c51]Jiahui Yang, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
A Small Sticker is Enough: Spoofing Face Recognition Systems via Small Stickers. EITCE 2022: 1075-1082 - [c50]Junning Ze, Xinfeng Li, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
UltraBD: Backdoor Attack against Automatic Speaker Verification Systems via Adversarial Ultrasound. ICPADS 2022: 193-200 - [c49]Jiaqi Pan, Xinyan Zhou, Zenan Zhang, Xiaoyu Ji, Haiming Chen:
G-PPG: A Gesture-related PPG-based Two-Factor Authentication for Wearable Devices. ICPADS 2022: 242-249 - [c48]Shan Zou, Juchuan Zhang, Shui Jiang, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
OutletGuarder: Detecting DarkSide Ransomware by Power Factor Correction Signals in an Electrical Outlet. ICPADS 2022: 419-426 - [c47]Hao Pan, Feitong Tan, Yi-Chao Chen, Gaoang Huang, Qingyang Li, Wenhao Li, Guangtao Xue, Lili Qiu, Xiaoyu Ji:
DoCam: depth sensing with an optical image stabilization supported RGB camera. MobiCom 2022: 405-418 - [c46]Hao Pan, Feitong Tan, Wenhao Li, Yi-Chao Chen, Lanqing Yang, Guangtao Xue, Xiaoyu Ji:
MagDefender: Detecting Eavesdropping on Mobile Devices using the Built-in Magnetometer. SECON 2022: 28-36 - [c45]Yan Jiang, Xiaoyu Ji, Kai Wang, Chen Yan, Richard Mitev, Ahmad-Reza Sadeghi, Wenyuan Xu:
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens. SP 2022: 984-1001 - [c44]Ruiwen He, Xiaoyu Ji, Xinfeng Li, Yushi Cheng, Wenyuan Xu:
"OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score. USENIX Security Symposium 2022: 1131-1148 - [c43]Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu:
GhostTouch: Targeted Attacks on Touchscreens without Physical Touch. USENIX Security Symposium 2022: 1543-1559 - [c42]Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu:
Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition. USENIX Security Symposium 2022: 1957-1974 - [i4]Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu:
Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition. CoRR abs/2204.02675 (2022) - 2021
- [j18]Jiayu Zhang, Zhiyun Wang, Xiaoyu Ji, Wenyuan Xu, Gang Qu, Minjian Zhao:
Who is Charging My Phone? Identifying Wireless Chargers via Fingerprinting. IEEE Internet Things J. 8(4): 2992-2999 (2021) - [j17]Chen Yan, Guoming Zhang, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu:
The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants. IEEE Trans. Dependable Secur. Comput. 18(3): 1108-1124 (2021) - [j16]Chaohao Li, Xiaoyu Ji, Bin Wang, Kai Wang, Wenyuan Xu:
SenCS: Enabling Real-time Indoor Proximity Verification via Contextual Similarity. ACM Trans. Sens. Networks 17(2): 19:1-19:22 (2021) - [c41]Xiaoyu Ji, Juchuan Zhang, Shui Jiang, Jishen Li, Wenyuan Xu:
CapSpeaker: Injecting Voices to Microphones via Capacitors. CCS 2021: 1915-1929 - [c40]Weizhao Jin, Xiaoyu Ji, Ruiwen He, Zhou Zhuang, Wenyuan Xu, Yuan Tian:
SMS Goes Nuclear: Fortifying SMS-Based MFA in Online Account Ecosystem. DSN Workshops 2021: 7-14 - [c39]Zhuoyang Shi, Chaohao Li, Zizhi Jin, Weinong Sun, Xiaoyu Ji, Wenyuan Xu:
Anti-Replay: A Fast and Lightweight Voice Replay Attack Detection System. ICPADS 2021: 169-176 - [c38]Yijie Li, Yi-Chao Chen, Xiaoyu Ji, Hao Pan, Lanqing Yang, Guangtao Xue, Jiadi Yu:
ScreenID: Enhancing QRCode Security by Fingerprinting Screens. INFOCOM 2021: 1-10 - [c37]Guoming Zhang, Xiaoyu Ji, Xinfeng Li, Gang Qu, Wenyuan Xu:
EarArray: Defending against DolphinAttack via Acoustic Attenuation. NDSS 2021 - [c36]Hao Pan, Lanqing Yang, Honglu Li, Chuang-Wen You, Xiaoyu Ji, Yi-Chao Chen, Zhenxian Hu, Guangtao Xue:
MagThief: Stealing Private App Usage Data on Mobile Devices via Built-in Magnetometer. SECON 2021: 1-9 - [c35]Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, Kevin Fu:
Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision. SP 2021: 160-175 - [c34]Yushi Cheng, Xiaoyu Ji, Lixu Wang, Qi Pang, Yi-Chao Chen, Wenyuan Xu:
mID: Tracing Screen Photos via Moiré Patterns. USENIX Security Symposium 2021: 2969-2986 - [c33]Juchuan Zhang, Xiaoyu Ji, Yuehan Chi, Yi-Chao Chen, Bin Wang, Wenyuan Xu:
OutletSpy: cross-outlet application inference via power factor correction signal. WISEC 2021: 181-191 - [i3]Weizhao Jin, Xiaoyu Ji, Ruiwen He, Zhou Zhuang, Wenyuan Xu, Yuan Tian:
Towards Fortifying the Multi-Factor-Based Online Account Ecosystem. CoRR abs/2104.08651 (2021) - 2020
- [j15]Guoming Zhang, Xiaoyu Ji, Yanjie Li, Wenyuan Xu:
Power-Based Non-Intrusive Condition Monitoring for Terminal Device in Smart Grid. Sensors 20(13): 3635 (2020) - [j14]Xiaoyu Ji, Chaohao Li, Xinyan Zhou, Juchuan Zhang, Yanmiao Zhang, Wenyuan Xu:
Authenticating Smart Home Devices via Home Limited Channels. ACM Trans. Internet Things 1(4): 24:1-24:24 (2020) - [j13]Yushi Cheng, Xiaoyu Ji, Tianyang Lu, Wenyuan Xu:
On Detecting Hidden Wireless Cameras: A Traffic Pattern-based Approach. IEEE Trans. Mob. Comput. 19(4): 907-921 (2020) - [j12]Xiaoyu Ji, Xinyan Zhou, Miao Xu, Wenyuan Xu, Yabo Dong:
OPCIO: Optimizing Power Consumption for Embedded Devices via GPIO Configuration. ACM Trans. Sens. Networks 16(2): 16:1-16:28 (2020) - [j11]Yushi Cheng, Xiaoyu Ji, Xiaopeng Li, Tianchen Zhang, Sharaf J. Malebary, Xianshan Qu, Wenyuan Xu:
Identifying Child Users via Touchscreen Interactions. ACM Trans. Sens. Networks 16(4): 35:1-35:25 (2020) - [c32]Dongxiao Jiang, Chenggang Li, Lixin Ma, Xiaoyu Ji, Yanjiao Chen, Bo Li:
ABInfer: A Novel Field Boundaries inference Approach for Protocol Reverse Engineering. BigDataSecurity/HPSC/IDS 2020: 19-23 - [c31]Lanqing Yang, Honglu Li, Zhaoxi Chen, Xiaoyu Ji, Yi-Chao Chen, Guangtao Xue, Chuang-Wen You:
Appliance fingerprinting using sound from power supply. UbiComp/ISWC Adjunct 2020: 160-163 - [c30]Juchuan Zhang, Xiaoyu Ji, Wenyuan Xu, Yi-Chao Chen, Yuting Tang, Gang Qu:
MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding. INFOCOM 2020: 357-366 - [c29]Yijie Li, Yi-Chao Chen, Xiaoyu Ji, Hao Pan, Lanqing Yang, Guangtao Xue, Jiadi Yu:
Toward a secure QR code system by fingerprinting screens. MobiCom 2020: 86:1-86:3
2010 – 2019
- 2019
- [j10]Taimin Zhang, Xiaoyu Ji, Zhou Zhuang, Wenyuan Xu:
JamCatcher: A Mobile Jammer Localization Scheme for Advanced Metering Infrastructure in Smart Grid. Sensors 19(4): 909 (2019) - [j9]Daibo Liu, Zhichao Cao, Yuan He, Xiaoyu Ji, Mengshu Hou, Hongbo Jiang:
Exploiting Concurrency for Opportunistic Forwarding in Duty-Cycled IoT Networks. ACM Trans. Sens. Networks 15(3): 31:1-31:33 (2019) - [c28]Yushi Cheng, Xiaoyu Ji, Wenyuan Xu, Hao Pan, Zhuangdi Zhu, Chuang-Wen You, Yi-Chao Chen, Lili Qiu:
MagAttack: Guessing Application Launching and Operation via Smartphone. AsiaCCS 2019: 283-294 - [c27]Yushi Cheng, Xiaoyu Ji, Juchuan Zhang, Wenyuan Xu, Yi-Chao Chen:
DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU. CCS 2019: 1149-1170 - [c26]Chen Yan, Yan Long, Xiaoyu Ji, Wenyuan Xu:
The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification. CCS 2019: 1215-1229 - [c25]Xinyan Zhou, Xiaoyu Ji, Chen Yan, Jiangyi Deng, Wenyuan Xu:
NAuth: Secure Face-to-Face Device Authentication via Nonlinearity. INFOCOM 2019: 2080-2088 - [c24]Hao Pan, Yi-Chao Chen, Lanqing Yang, Guangtao Xue, Chuang-Wen You, Xiaoyu Ji:
mQRCode: Secure QR Code Using Nonlinearity of Spatial Frequency in Light. MobiCom 2019: 27:1-27:18 - [c23]Hao Pan, Lanqing Yang, Yi-Chao Chen, Guangtao Xue, Chuang-Wen You, Xiaoyu Ji, Pai-Yen Chen:
Poster: Secure Visible Light Communication based on Nonlinearity of Spatial Frequency in Light. MobiCom 2019: 93:1-93:3 - [c22]Guoming Zhang, Xiaoyu Ji, Xinyan Zhou, Donglian Qi, Wenyuan Xu:
UltraComm: High-Speed and Inaudible Acoustic Communication. QSHINE 2019: 184-204 - [c21]Taimin Zhang, Xiaoyu Ji, Wenyuan Xu:
AHV-RPL: Jamming-Resilient Backup Nodes Selection for RPL-Based Routing in Smart Grid AMI Networks. QSHINE 2019: 235-251 - 2018
- [j8]Wenyuan Xu, Chen Yan, Weibin Jia, Xiaoyu Ji, Jianhao Liu:
Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles. IEEE Internet Things J. 5(6): 5015-5029 (2018) - [j7]Xiaoyu Ji, Yushi Cheng, Wenyuan Xu, Xinyan Zhou:
User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes. Secur. Commun. Networks 2018: 3980371:1-3980371:10 (2018) - [j6]Xinyan Zhou, Xiaoyu Ji, Yi-Chao Chen, Xiaopeng Li, Wenyuan Xu:
LESS: Link Estimation with Sparse Sampling in Intertidal WSNs. Sensors 18(3): 747 (2018) - [j5]Xinyan Zhou, Xiaoyu Ji, Bin Wang, Yushi Cheng, Zhuoran Ma, Francis Choi, Brian Helmuth, Wenyuan Xu:
Pido: Predictive Delay Optimization for Intertidal Wireless Sensor Networks. Sensors 18(5): 1464 (2018) - [j4]Wei Gong, Haoxiang Liu, Jiangchuan Liu, Xiaoyi Fan, Kebin Liu, Qiang Ma, Xiaoyu Ji:
Channel-Aware Rate Adaptation for Backscatter Networks. IEEE/ACM Trans. Netw. 26(2): 751-764 (2018) - [c20]Yushi Cheng, Xiaoyu Ji, Tianyang Lu, Wenyuan Xu:
DeWiCam: Detecting Hidden Wireless Cameras via Smartphones. AsiaCCS 2018: 1-13 - [c19]Chaohao Li, Xiaoyu Ji, Xinyan Zhou, Juchuan Zhang, Jing Tian, Yanmiao Zhang, Wenyuan Xu:
HlcAuth: Key-free and Secure Communications via Home-Limited Channel. AsiaCCS 2018: 29-35 - [c18]Zhou Zhuang, Xiaoyu Ji, Taimin Zhang, Juchuan Zhang, Wenyuan Xu, Zhenhua Li, Yunhao Liu:
FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting. AsiaCCS 2018: 261-272 - [c17]Hao Pan, Yi-Chao Chen, Guangtao Xue, Chuang-Wen You, Xiaoyu Ji:
Secure QR Code Scheme Using Nonlinearity of Spatial Frequency. UbiComp/ISWC Adjunct 2018: 207-210 - [c16]Xiaopeng Li, Sharaf J. Malebary, Xianshan Qu, Xiaoyu Ji, Yushi Cheng, Wenyuan Xu:
iCare: Automatic and User-friendly Child Identification on Smartphones. HotMobile 2018: 43-48 - [i2]Wenyuan Xu, Xiaopeng Li, Jing Tian, Yujun Xiao, Xianshan Qu, Song Wang, Xiaoyu Ji:
Which One to Go: Security and Usability Evaluation of Mid-Air Gestures. CoRR abs/1811.10168 (2018) - 2017
- [j3]Xiaoyu Ji, Yuan He, Jiliang Wang, Kaishun Wu, Daibo Liu, Ke Yi, Yunhao Liu:
On Improving Wireless Channel Utilization: A Collision Tolerance-Based Approach. IEEE Trans. Mob. Comput. 16(3): 787-800 (2017) - [c15]Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu:
DolphinAttack: Inaudible Voice Commands. CCS 2017: 103-117 - [c14]Yushi Cheng, Xiaoyu Ji, Xinyan Zhou, Wenyuan Xu:
HomeSpy: Inferring User Presence via Encrypted Traffic of Home Surveillance Camera. ICPADS 2017: 779-782 - [c13]Hao Pan, Yi-Chao Chen, Guangtao Xue, Xiaoyu Ji:
MagneComm: Magnetometer-based Near-Field Communication. MobiCom 2017: 167-179 - [c12]Xiaohan Lai, Miao Xu, Xiaoyu Ji, Wenyuan Xu, Longdao Chen:
En-MAC: Environment-aware MAC protocol for WSNs in intertidal environment. WCSP 2017: 1-6 - [c11]Zhuoran Ma, Xinyan Zhou, Xuan Ouyang, Xiaoyu Ji, Wenyuan Xu:
A robust backup routing protocol for neighbor area network in the smart grid. WCSP 2017: 1-6 - [c10]Xinyan Zhou, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
SADO: State-associated and delay-oriented data collection for intertidal WSNs. WCSP 2017: 1-6 - [i1]Guoming Zhang, Chen Yan, Xiaoyu Ji, Taimin Zhang, Tianchen Zhang, Wenyuan Xu:
DolphinAtack: Inaudible Voice Commands. CoRR abs/1708.09537 (2017) - 2016
- [j2]Xi Chen, Xiaopei Wu, Xiang-Yang Li, Xiaoyu Ji, Yuan He, Yunhao Liu:
Privacy-Aware High-Quality Map Generation with Participatory Sensing. IEEE Trans. Mob. Comput. 15(3): 719-732 (2016) - [j1]Xiaoyu Ji, Jiliang Wang, Mingyan Liu, Yubo Yan, Panlong Yang, Yunhao Liu:
Hitchhike: A Preamble-Based Control Plane for SNR-Sensitive Wireless Networks. IEEE Trans. Wirel. Commun. 15(2): 1239-1251 (2016) - [c9]Zhuangdi Zhu, Hao Pan, Yi-Chao Chen, Xiaoyu Ji, Fan Zhang, Chuang-Wen You:
MagAttack: remote app sensing with your phone. UbiComp Adjunct 2016: 241-244 - [c8]Yi Zhang, Jiliang Wang, Yuan He, Xiaoyu Ji, Yanrong Kang, Daibo Liu, Bo Li:
Furion: Towards Energy-Efficient WiFi Offloading under Link Dynamics. SECON 2016: 1-9 - 2015
- [c7]Daibo Liu, Zhichao Cao, Xiaopei Wu, Yuan He, Xiaoyu Ji, Mengshu Hou:
Tele Adjusting: Using Path Coding and Opportunistic Forwarding for Remote Control in WSNs. ICDCS 2015: 716-725 - [c6]Daibo Liu, Mengshu Hou, Zhichao Cao, Yuan He, Xiaoyu Ji, Xiaolong Zheng:
COF: Exploiting Concurrency for Low Power Opportunistic Forwarding. ICNP 2015: 32-42 - 2014
- [c5]Xiaoyu Ji, Yuan He, Jiliang Wang, Wei Dong, Xiaopei Wu, Yunhao Liu:
Walking down the STAIRS: Efficient collision resolution for wireless sensor networks. INFOCOM 2014: 961-969 - [c4]Xiaoyu Ji, Jiliang Wang, Mingyan Liu, Yubo Yan, Panlong Yang, Yunhao Liu:
Hitchhike: Riding control on preambles. INFOCOM 2014: 2499-2507 - 2013
- [c3]Xiaoyu Ji, Yuan He, Jiliang Wang, Kaishun Wu, Ke Yi, Yunhao Liu:
Voice over the dins: Improving wireless channel utilization with collision tolerance. ICNP 2013: 1-10 - 2010
- [c2]Lining Yao, Yan Shi, Hengfeng Chi, Xiaoyu Ji, Fangtian Ying:
Music-touch shoes: vibrotactile interface for hearing impaired dancers. TEI 2010: 275-276 - [c1]Yan Shi, Lining Yao, Xiaoyu Ji, Fangtian Ying:
Integrating old chinese shadow play-piying into tangible interaction (abstract only). TEI 2010: 375
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-24 17:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint