关注
Haojin Zhu
Haojin Zhu
在 cs.sjtu.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
年份
Secure and Efficient UAV Tracking in Space-Air-Ground Integrated Network
J Li, W Zhang, Y Meng, S Li, L Ma, Z Liu, H Zhu
IEEE Transactions on Vehicular Technology, 2023
2023
Wireless Signal Based Two-Factor Authentication at Voice Interface Layer
Y Meng, H Zhu, X Shen
Security in Smart Home Networks, 77-106, 2023
2023
Microphone Array Based Passive Liveness Detection at Voice Interface Layer
Y Meng, H Zhu, X Shen
Security in Smart Home Networks, 107-133, 2022
2022
Privacy Breaches and Countermeasures at Terminal Device Layer
Y Meng, H Zhu, X Shen
Security in Smart Home Networks, 37-75, 2022
2022
Conclusion and future directions
Y Meng, H Zhu, X Shen
Security in Smart Home Networks, 163-166, 2022
2022
Literature Review of Security in Smart Home Network
Y Meng, H Zhu, X Shen
Security in Smart Home Networks, 21-35, 2022
2022
Traffic Analysis Based Misbehavior Detection at Application Platform Layer
Y Meng, H Zhu, X Shen
Security in Smart Home Networks, 135-162, 2022
2022
Secure hierarchical deterministic wallet supporting stealth address
X Yin, Z Liu, G Yang, G Chen, H Zhu
Computer Security–ESORICS 2022: 27th European Symposium on Research in …, 2022
32022
Backdoors Against Natural Language Processing: A Review
S Li, T Dong, BZH Zhao, M Xue, S Du, H Zhu
IEEE Security & Privacy 20 (05), 50-59, 2022
22022
Thwarting Longitudinal Location Exposure Attacks in Advertising Ecosystem via Edge Computing
L Yu, S Zhang, L Zhou, Y Meng, S Du, H Zhu
2022 IEEE 42nd International Conference on Distributed Computing Systems …, 2022
12022
Tradeoff between Privacy and Utility for Location-based Recommendation Services
Z Gao, A Sepahi, S Pouryousef, L Zhou, H Zhu
ICC 2022-IEEE International Conference on Communications, 4396-4401, 2022
2022
Thwarting unauthorized voice eavesdropping via touch sensing in mobile systems
W Huang, W Tang, K Zhang, H Zhu, Y Zhang
IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 31-40, 2022
42022
WiCapose: Multi-modal fusion based transparent authentication in mobile environments
Z Chang, Y Meng, W Liu, H Zhu, L Wang
Journal of Information Security and Applications 66, 103130, 2022
12022
Wireless Training-Free Keystroke Inference Attack and Defense
E Yang, S Fang, I Markwood, Y Liu, S Zhao, Z Lu, H Zhu
IEEE/ACM Transactions on Networking 30 (4), 1733-1748, 2022
42022
Fingerprinting deep neural networks globally via universal adversarial perturbations
Z Peng, S Li, G Chen, C Zhang, H Zhu, M Xue
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
92022
Your microphone array retains your identity: A robust voice liveness detection system for smart speakers
Y Meng, J Li, M Pillari, A Deopujari, L Brennan, H Shamsie, H Zhu, Y Tian
31st USENIX Security Symposium (USENIX Security 22), 1077-1094, 2022
112022
Exposing weaknesses of malware detectors with explainability-guided evasion attacks
W Wang, R Sun, T Dong, S Li, M Xue, G Tyson, H Zhu
arXiv preprint arXiv:2111.10085, 2021
92021
POSTER: ReAvatar: Virtual Reality De-anonymization Attack Through Correlating Movement Signatures
B Falk, Y Meng, Y Zhan, H Zhu
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
42021
Understanding and detecting mobile ad fraud through the lens of invalid traffic
S Sun, L Yu, X Zhang, M Xue, R Zhou, H Zhu, S Hao, X Lin
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
92021
Dissecting click fraud autonomy in the wild
T Zhu, Y Meng, H Hu, X Zhang, M Xue, H Zhu
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
82021
系统目前无法执行此操作,请稍后再试。
文章 1–20