Secure and Efficient UAV Tracking in Space-Air-Ground Integrated Network J Li, W Zhang, Y Meng, S Li, L Ma, Z Liu, H Zhu IEEE Transactions on Vehicular Technology, 2023 | | 2023 |
Wireless Signal Based Two-Factor Authentication at Voice Interface Layer Y Meng, H Zhu, X Shen Security in Smart Home Networks, 77-106, 2023 | | 2023 |
Microphone Array Based Passive Liveness Detection at Voice Interface Layer Y Meng, H Zhu, X Shen Security in Smart Home Networks, 107-133, 2022 | | 2022 |
Privacy Breaches and Countermeasures at Terminal Device Layer Y Meng, H Zhu, X Shen Security in Smart Home Networks, 37-75, 2022 | | 2022 |
Conclusion and future directions Y Meng, H Zhu, X Shen Security in Smart Home Networks, 163-166, 2022 | | 2022 |
Literature Review of Security in Smart Home Network Y Meng, H Zhu, X Shen Security in Smart Home Networks, 21-35, 2022 | | 2022 |
Traffic Analysis Based Misbehavior Detection at Application Platform Layer Y Meng, H Zhu, X Shen Security in Smart Home Networks, 135-162, 2022 | | 2022 |
Secure hierarchical deterministic wallet supporting stealth address X Yin, Z Liu, G Yang, G Chen, H Zhu Computer Security–ESORICS 2022: 27th European Symposium on Research in …, 2022 | 3 | 2022 |
Backdoors Against Natural Language Processing: A Review S Li, T Dong, BZH Zhao, M Xue, S Du, H Zhu IEEE Security & Privacy 20 (05), 50-59, 2022 | 2 | 2022 |
Thwarting Longitudinal Location Exposure Attacks in Advertising Ecosystem via Edge Computing L Yu, S Zhang, L Zhou, Y Meng, S Du, H Zhu 2022 IEEE 42nd International Conference on Distributed Computing Systems …, 2022 | 1 | 2022 |
Tradeoff between Privacy and Utility for Location-based Recommendation Services Z Gao, A Sepahi, S Pouryousef, L Zhou, H Zhu ICC 2022-IEEE International Conference on Communications, 4396-4401, 2022 | | 2022 |
Thwarting unauthorized voice eavesdropping via touch sensing in mobile systems W Huang, W Tang, K Zhang, H Zhu, Y Zhang IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 31-40, 2022 | 4 | 2022 |
WiCapose: Multi-modal fusion based transparent authentication in mobile environments Z Chang, Y Meng, W Liu, H Zhu, L Wang Journal of Information Security and Applications 66, 103130, 2022 | 1 | 2022 |
Wireless Training-Free Keystroke Inference Attack and Defense E Yang, S Fang, I Markwood, Y Liu, S Zhao, Z Lu, H Zhu IEEE/ACM Transactions on Networking 30 (4), 1733-1748, 2022 | 4 | 2022 |
Fingerprinting deep neural networks globally via universal adversarial perturbations Z Peng, S Li, G Chen, C Zhang, H Zhu, M Xue Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022 | 9 | 2022 |
Your microphone array retains your identity: A robust voice liveness detection system for smart speakers Y Meng, J Li, M Pillari, A Deopujari, L Brennan, H Shamsie, H Zhu, Y Tian 31st USENIX Security Symposium (USENIX Security 22), 1077-1094, 2022 | 11 | 2022 |
Exposing weaknesses of malware detectors with explainability-guided evasion attacks W Wang, R Sun, T Dong, S Li, M Xue, G Tyson, H Zhu arXiv preprint arXiv:2111.10085, 2021 | 9 | 2021 |
POSTER: ReAvatar: Virtual Reality De-anonymization Attack Through Correlating Movement Signatures B Falk, Y Meng, Y Zhan, H Zhu Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 4 | 2021 |
Understanding and detecting mobile ad fraud through the lens of invalid traffic S Sun, L Yu, X Zhang, M Xue, R Zhou, H Zhu, S Hao, X Lin Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 9 | 2021 |
Dissecting click fraud autonomy in the wild T Zhu, Y Meng, H Hu, X Zhang, M Xue, H Zhu Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 8 | 2021 |