关注
Qinhong Jiang
Qinhong Jiang
在 zju.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A survey on voice assistant security: Attacks and countermeasures
C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu
ACM Computing Surveys 55 (4), 1-36, 2022
512022
{GlitchHiker}: Uncovering Vulnerabilities of Image Signal Transmission with {IEMI}
Q Jiang, X Ji, C Yan, Z Xie, H Lou, W Xu
32nd USENIX Security Symposium (USENIX Security 23), 7249-7266, 2023
172023
EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras
Y Long, Q Jiang, C Yan, T Alam, X Ji, W Xu, K Fu
Proceedings of ACM NDSS, 2024
62024
Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection
Y Zhang, C Yang, EY Fu, Q Jiang, C Yan, SY Chau, G Ngai, HV Leong, ...
arXiv preprint arXiv:2407.16327, 2024
22024
Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification
X Ji, Q Jiang, C Li, Z Shi, W Xu
IEEE Transactions on Information Forensics and Security, 2024
2024
Intentional Electromagnetic Interference Attack against Infrared Thermal Imaging Sensor
H Zhang, Q Jiang, Y Cheng, X Ji, W Xu
2022 IEEE 6th Conference on Energy Internet and Energy System Integration …, 2022
2022
系统目前无法执行此操作,请稍后再试。
文章 1–6