Blue note: How intentional acoustic interference damages availability and integrity in hard disk drives and operating systems C Bolton, S Rampazzi, C Li, A Kwong, W Xu, K Fu 2018 IEEE Symposium on Security and Privacy (SP), 1048-1062, 2018 | 53 | 2018 |
Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks X Li, X Ji, C Yan, C Li, Y Li, Z Zhang, W Xu USENIX Security, 2023 | 16 | 2023 |
HlcAuth: Key-free and secure communications via home-limited channel C Li, X Ji, X Zhou, J Zhang, J Tian, Y Zhang, W Xu Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 13 | 2018 |
DeHiREC: Detecting hidden voice recorders via ADC electromagnetic radiation R Zhou, X Ji, C Yan, YC Chen, W Xu, C Li 2023 IEEE Symposium on Security and Privacy (SP), 3113-3128, 2023 | 10 | 2023 |
Authenticating smart home devices via home limited channels X Ji, C Li, X Zhou, J Zhang, Y Zhang, W Xu ACM Transactions on Internet of Things 1 (4), 1-24, 2020 | 8 | 2020 |
Toward pitch-insensitive speaker verification via soundfield X Li, Z Zheng, C Yan, C Li, X Ji, W Xu IEEE Internet of Things Journal 11 (1), 1175-1189, 2023 | 5 | 2023 |
Sencs: Enabling real-time indoor proximity verification via contextual similarity C Li, X Ji, B Wang, K Wang, W Xu ACM Transactions on Sensor Networks (TOSN) 17 (2), 1-22, 2021 | 5 | 2021 |
Volttack: Control iot devices by manipulating power supply voltage K Wang, S Xiao, X Ji, C Yan, C Li, W Xu 2023 IEEE Symposium on Security and Privacy (SP), 1771-1788, 2023 | 4 | 2023 |
Anti-replay: A fast and lightweight voice replay attack detection system Z Shi, C Li, Z Jin, W Sun, X Ji, W Xu 2021 IEEE 27th International Conference on Parallel and Distributed Systems …, 2021 | 4 | 2021 |
VarASV: Enabling pitch-variable automatic speaker verification via multi-task learning Y Gao, X Li, C Li, W Sun, X Ji, W Xu 2021 IEEE 5th Conference on Energy Internet and Energy System Integration …, 2021 | 1 | 2021 |
IMPRINTS: Mitigating Watermark Removal Attacks With Defensive Watermarks X Chen, J Deng, Y Chen, C Li, X Fang, C Liu, W Xu IEEE Transactions on Information Forensics and Security, 2025 | | 2025 |
EL-FDL: Improving Image Forgery Detection and Localization via Ensemble Learning B Wang, F Wang, J Wang, H Yan, S Zhou, C Li International Conference on Artificial Neural Networks, 248-262, 2024 | | 2024 |
Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification X Ji, Q Jiang, C Li, Z Shi, W Xu IEEE Transactions on Information Forensics and Security 19, 3366-3379, 2024 | | 2024 |
基于剪枝技术和鲁棒蒸馏融合的轻量对抗攻击防御方法 王滨, 李思敏, 钱亚冠, 张君, 李超豪, 朱晨鸣, 张鸿飞 网络与信息安全学报 8 (6), 102-109, 2022 | | 2022 |
物联网邻近交互安全关键技术研究 李超豪 浙江大学, 2021 | | 2021 |
Poster: Blue Note-How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems C Bolton, S Rampazzi, C Li, A Kwong, W Xu, K Fu | | |