A survey on voice assistant security: Attacks and countermeasures C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu ACM Computing Surveys 55 (4), 1-36, 2022 | 51 | 2022 |
{GlitchHiker}: Uncovering Vulnerabilities of Image Signal Transmission with {IEMI} Q Jiang, X Ji, C Yan, Z Xie, H Lou, W Xu 32nd USENIX Security Symposium (USENIX Security 23), 7249-7266, 2023 | 17 | 2023 |
EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras Y Long, Q Jiang, C Yan, T Alam, X Ji, W Xu, K Fu Proceedings of ACM NDSS, 2024 | 6 | 2024 |
Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection Y Zhang, C Yang, EY Fu, Q Jiang, C Yan, SY Chau, G Ngai, HV Leong, ... arXiv preprint arXiv:2407.16327, 2024 | 2 | 2024 |
Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification X Ji, Q Jiang, C Li, Z Shi, W Xu IEEE Transactions on Information Forensics and Security, 2024 | | 2024 |
Intentional Electromagnetic Interference Attack against Infrared Thermal Imaging Sensor H Zhang, Q Jiang, Y Cheng, X Ji, W Xu 2022 IEEE 6th Conference on Energy Internet and Energy System Integration …, 2022 | | 2022 |