My smartphone knows what you print: Exploring smartphone-based side-channel attacks against 3d printers C Song, F Lin, Z Ba, K Ren, C Zhou, W Xu Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 138 | 2016 |
Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer. Z Ba, T Zheng, X Zhang, Z Qin, B Li, X Liu, K Ren NDSS 2020, 1-18, 2020 | 99 | 2020 |
Wavoice: A noise-resistant multi-modal speech recognition system fusing mmwave and audio signals T Liu, M Gao, F Lin, C Wang, Z Ba, J Han, W Xu, K Ren Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems …, 2021 | 65 | 2021 |
Towards query-efficient adversarial attacks against automatic speech recognition systems Q Wang, B Zheng, Q Li, C Shen, Z Ba IEEE Transactions on Information Forensics and Security 16, 896-908, 2020 | 55 | 2020 |
Avoid-df: Audio-visual joint learning for detecting deepfake W Yang, X Zhou, Z Chen, B Guo, Z Ba, Z Xia, X Cao, K Ren IEEE Transactions on Information Forensics and Security 18, 2015-2029, 2023 | 44 | 2023 |
ABC: Enabling smartphone authentication with built-in camera Z Ba, S Piao, X Fu, D Koutsonikolas, A Mohaisen, K Ren 25th Annual Network and Distributed System Security Symposium, NDSS 2018, 2018 | 42 | 2018 |
Automating csi measurement with uavs: from problem formulation to energy-optimal solution S Piao, Z Ba, L Su, D Koutsonikolas, S Li, K Ren IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2404-2412, 2019 | 39 | 2019 |
mmphone: Acoustic eavesdropping on loudspeakers via mmwave-characterized piezoelectric effect C Wang, F Lin, T Liu, Z Liu, Y Shen, Z Ba, L Lu, W Xu, K Ren IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 820-829, 2022 | 23 | 2022 |
Wavesdropper: Through-wall word detection of human speech via commercial mmWave devices C Wang, F Lin, Z Ba, F Zhang, W Xu, K Ren Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2022 | 15 | 2022 |
Toward hardware-rooted smartphone authentication K Ren, Z Qin, Z Ba IEEE Wireless Communications 26 (1), 114-119, 2019 | 15 | 2019 |
PhoneyTalker: An out-of-the-box toolkit for adversarial example attack on speaker recognition M Chen, L Lu, Z Ba, K Ren IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 1419-1428, 2022 | 14 | 2022 |
Is imitation all you need? generalized decision-making with dual-phase training Y Wei, Y Sun, R Zheng, S Vemprala, R Bonatti, S Chen, R Madaan, Z Ba, ... Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023 | 12 | 2023 |
Transferring audio deepfake detection capability across languages Z Ba, Q Wen, P Cheng, Y Wang, F Lin, L Lu, Z Liu Proceedings of the ACM Web Conference 2023, 2033-2044, 2023 | 11 | 2023 |
CamRadar: hidden camera detection leveraging amplitude-modulated sensor images embedded in electromagnetic emanations Z Liu, F Lin, C Wang, Y Shen, Z Ba, L Lu, W Xu, K Ren Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2023 | 11 | 2023 |
Text-crs: A generalized certified robustness framework against textual adversarial attacks X Zhang, H Hong, Y Hong, P Huang, B Wang, Z Ba, K Ren arXiv preprint arXiv:2307.16630, 2023 | 10 | 2023 |
Inertiear: Automatic and device-independent imu-based eavesdropping on smartphones M Gao, Y Liu, Y Chen, Y Li, Z Ba, X Xu, J Han IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 1129-1138, 2022 | 10 | 2022 |
Addressing smartphone-based multi-factor authentication via hardware-rooted technologies Z Ba, K Ren 2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017 | 10 | 2017 |
MobiScan: An enhanced invisible screen‐camera communication system for IoT applications X Zhang, J Liu, Z Ba, Y Tao, X Cheng Transactions on Emerging Telecommunications Technologies 33 (4), e4151, 2022 | 9 | 2022 |
CIM: Camera in motion for smartphone authentication Z Ba, Z Qin, X Fu, K Ren IEEE Transactions on Information Forensics and Security 14 (11), 2987-3002, 2019 | 9 | 2019 |
Privacyasst: Safeguarding user privacy in tool-using large language model agents X Zhang, H Xu, Z Ba, Z Wang, Y Hong, J Liu, Z Qin, K Ren IEEE Transactions on Dependable and Secure Computing, 2024 | 8 | 2024 |