关注
Zhongjie Ba
Zhongjie Ba
在 zju.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
My smartphone knows what you print: Exploring smartphone-based side-channel attacks against 3d printers
C Song, F Lin, Z Ba, K Ren, C Zhou, W Xu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1382016
Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer.
Z Ba, T Zheng, X Zhang, Z Qin, B Li, X Liu, K Ren
NDSS 2020, 1-18, 2020
992020
Wavoice: A noise-resistant multi-modal speech recognition system fusing mmwave and audio signals
T Liu, M Gao, F Lin, C Wang, Z Ba, J Han, W Xu, K Ren
Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems …, 2021
652021
Towards query-efficient adversarial attacks against automatic speech recognition systems
Q Wang, B Zheng, Q Li, C Shen, Z Ba
IEEE Transactions on Information Forensics and Security 16, 896-908, 2020
552020
Avoid-df: Audio-visual joint learning for detecting deepfake
W Yang, X Zhou, Z Chen, B Guo, Z Ba, Z Xia, X Cao, K Ren
IEEE Transactions on Information Forensics and Security 18, 2015-2029, 2023
442023
ABC: Enabling smartphone authentication with built-in camera
Z Ba, S Piao, X Fu, D Koutsonikolas, A Mohaisen, K Ren
25th Annual Network and Distributed System Security Symposium, NDSS 2018, 2018
422018
Automating csi measurement with uavs: from problem formulation to energy-optimal solution
S Piao, Z Ba, L Su, D Koutsonikolas, S Li, K Ren
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2404-2412, 2019
392019
mmphone: Acoustic eavesdropping on loudspeakers via mmwave-characterized piezoelectric effect
C Wang, F Lin, T Liu, Z Liu, Y Shen, Z Ba, L Lu, W Xu, K Ren
IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 820-829, 2022
232022
Wavesdropper: Through-wall word detection of human speech via commercial mmWave devices
C Wang, F Lin, Z Ba, F Zhang, W Xu, K Ren
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2022
152022
Toward hardware-rooted smartphone authentication
K Ren, Z Qin, Z Ba
IEEE Wireless Communications 26 (1), 114-119, 2019
152019
PhoneyTalker: An out-of-the-box toolkit for adversarial example attack on speaker recognition
M Chen, L Lu, Z Ba, K Ren
IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 1419-1428, 2022
142022
Is imitation all you need? generalized decision-making with dual-phase training
Y Wei, Y Sun, R Zheng, S Vemprala, R Bonatti, S Chen, R Madaan, Z Ba, ...
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023
122023
Transferring audio deepfake detection capability across languages
Z Ba, Q Wen, P Cheng, Y Wang, F Lin, L Lu, Z Liu
Proceedings of the ACM Web Conference 2023, 2033-2044, 2023
112023
CamRadar: hidden camera detection leveraging amplitude-modulated sensor images embedded in electromagnetic emanations
Z Liu, F Lin, C Wang, Y Shen, Z Ba, L Lu, W Xu, K Ren
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2023
112023
Text-crs: A generalized certified robustness framework against textual adversarial attacks
X Zhang, H Hong, Y Hong, P Huang, B Wang, Z Ba, K Ren
arXiv preprint arXiv:2307.16630, 2023
102023
Inertiear: Automatic and device-independent imu-based eavesdropping on smartphones
M Gao, Y Liu, Y Chen, Y Li, Z Ba, X Xu, J Han
IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 1129-1138, 2022
102022
Addressing smartphone-based multi-factor authentication via hardware-rooted technologies
Z Ba, K Ren
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
102017
MobiScan: An enhanced invisible screen‐camera communication system for IoT applications
X Zhang, J Liu, Z Ba, Y Tao, X Cheng
Transactions on Emerging Telecommunications Technologies 33 (4), e4151, 2022
92022
CIM: Camera in motion for smartphone authentication
Z Ba, Z Qin, X Fu, K Ren
IEEE Transactions on Information Forensics and Security 14 (11), 2987-3002, 2019
92019
Privacyasst: Safeguarding user privacy in tool-using large language model agents
X Zhang, H Xu, Z Ba, Z Wang, Y Hong, J Liu, Z Qin, K Ren
IEEE Transactions on Dependable and Secure Computing, 2024
82024
系统目前无法执行此操作,请稍后再试。
文章 1–20