Dolphinattack: Inaudible voice commands G Zhang, C Yan, X Ji, T Zhang, T Zhang, W Xu Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 874 | 2017 |
Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle C Yan, W Xu, J Liu Def Con 24 (8), 109, 2016 | 436 | 2016 |
Analyzing and enhancing the security of ultrasonic sensors for autonomous vehicles W Xu, C Yan, W Jia, X Ji, J Liu IEEE Internet of Things Journal 5 (6), 5015-5029, 2018 | 166 | 2018 |
SoK: A Minimalist Approach to Formalizing Analog Sensor Security C Yan, H Shin, C Bolton, W Xu, Y Kim, K Fu 2020 IEEE Symposium on Security and Privacy (SP), 480-495, 2020 | 78 | 2020 |
The feasibility of injecting inaudible voice commands to voice assistants C Yan, G Zhang, X Ji, T Zhang, T Zhang, W Xu IEEE Transactions on Dependable and Secure Computing 18 (3), 1108-1124, 2019 | 74 | 2019 |
The catcher in the field: A fieldprint based spoofing detection for text-independent speaker verification C Yan, Y Long, X Ji, W Xu Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 71 | 2019 |
Cybersecurity and medical devices: a practical guide for cardiac electrophysiologists B Ransford, DB Kramer, D Foo Kune, J Auto de Medeiros, C Yan, W Xu, ... Pacing and Clinical Electrophysiology 40 (8), 913-917, 2017 | 63 | 2017 |
Poltergeist: Acoustic adversarial machine learning against cameras and computer vision X Ji, Y Cheng, Y Zhang, K Wang, C Yan, W Xu, K Fu 2021 IEEE Symposium on Security and Privacy (SP), 160-175, 2021 | 51 | 2021 |
A survey on voice assistant security: Attacks and countermeasures C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu ACM Computing Surveys 55 (4), 1-36, 2022 | 42 | 2022 |
PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle Z Jin, J Xiaoyu, Y Cheng, B Yang, C Yan, W Xu 2023 IEEE Symposium on Security and Privacy (SP), 710-727, 2023 | 28 | 2023 |
Rolling colors: Adversarial laser exploits against traffic light recognition C Yan, Z Xu, Z Yin, S Mangard, X Ji, W Xu, K Zhao, Y Zhou, T Wang, G Gu, ... 31st USENIX Security Symposium (USENIX Security 22), 1957-1974, 2022 | 26 | 2022 |
GhostTouch: Targeted Attacks on Touchscreens without Physical Touch K Wang, R Mitev, C Yan, X Ji, AR Sadeghi, W Xu USENIX Security, 2022 | 22 | 2022 |
On Cuba, diplomats, ultrasound, and intermodulation distortion C Yan, K Fu, W Xu Computers in biology and medicine 104, 250-266, 2019 | 20 | 2019 |
Nauth: Secure face-to-face device authentication via nonlinearity X Zhou, X Ji, C Yan, J Deng, W Xu IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2080-2088, 2019 | 18 | 2019 |
Wight: Wired ghost touch attack on capacitive touchscreens Y Jiang, X Ji, K Wang, C Yan, R Mitev, AR Sadeghi, W Xu 2022 IEEE Symposium on Security and Privacy (SP), 984-1001, 2022 | 14 | 2022 |
{GlitchHiker}: Uncovering Vulnerabilities of Image Signal Transmission with {IEMI} Q Jiang, X Ji, C Yan, Z Xie, H Lou, W Xu 32nd USENIX Security Symposium (USENIX Security 23), 7249-7266, 2023 | 9 | 2023 |
Method of defending against inaudible attacks on voice assistant based on machine learning W Xu, JI Xiaoyu, G Zhang, C Yan, T Zhang, T Zhang US Patent 11,450,324, 2022 | 8 | 2022 |
Learning normality is enough: a software-based mitigation against inaudible voice attacks X Li, X Ji, C Yan, C Li, Y Li, Z Zhang, W Xu 32nd USENIX Security Symposium (USENIX Security 23), 2455-2472, 2023 | 6 | 2023 |
A Nonlinearity-based Secure Face-to-Face Device Authentication for Mobile Devices X Ji, X Zhou, C Yan, J Deng, W Xu IEEE Transactions on Mobile Computing, 1-1, 2020 | 5 | 2020 |
DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation R Zhou, X Ji, C Yan, YC Chen, W Xu, C Li 2023 IEEE Symposium on Security and Privacy (SP), 658-673, 2023 | 4 | 2023 |