关注
Chaohao Li
Chaohao Li
Hangzhou Hikvision Digital Technology Co., Ltd.
在 zju.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Blue note: How intentional acoustic interference damages availability and integrity in hard disk drives and operating systems
C Bolton, S Rampazzi, C Li, A Kwong, W Xu, K Fu
2018 IEEE Symposium on Security and Privacy (SP), 1048-1062, 2018
532018
Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks
X Li, X Ji, C Yan, C Li, Y Li, Z Zhang, W Xu
USENIX Security, 2023
162023
HlcAuth: Key-free and secure communications via home-limited channel
C Li, X Ji, X Zhou, J Zhang, J Tian, Y Zhang, W Xu
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
132018
DeHiREC: Detecting hidden voice recorders via ADC electromagnetic radiation
R Zhou, X Ji, C Yan, YC Chen, W Xu, C Li
2023 IEEE Symposium on Security and Privacy (SP), 3113-3128, 2023
102023
Authenticating smart home devices via home limited channels
X Ji, C Li, X Zhou, J Zhang, Y Zhang, W Xu
ACM Transactions on Internet of Things 1 (4), 1-24, 2020
82020
Toward pitch-insensitive speaker verification via soundfield
X Li, Z Zheng, C Yan, C Li, X Ji, W Xu
IEEE Internet of Things Journal 11 (1), 1175-1189, 2023
52023
Sencs: Enabling real-time indoor proximity verification via contextual similarity
C Li, X Ji, B Wang, K Wang, W Xu
ACM Transactions on Sensor Networks (TOSN) 17 (2), 1-22, 2021
52021
Volttack: Control iot devices by manipulating power supply voltage
K Wang, S Xiao, X Ji, C Yan, C Li, W Xu
2023 IEEE Symposium on Security and Privacy (SP), 1771-1788, 2023
42023
Anti-replay: A fast and lightweight voice replay attack detection system
Z Shi, C Li, Z Jin, W Sun, X Ji, W Xu
2021 IEEE 27th International Conference on Parallel and Distributed Systems …, 2021
42021
VarASV: Enabling pitch-variable automatic speaker verification via multi-task learning
Y Gao, X Li, C Li, W Sun, X Ji, W Xu
2021 IEEE 5th Conference on Energy Internet and Energy System Integration …, 2021
12021
IMPRINTS: Mitigating Watermark Removal Attacks With Defensive Watermarks
X Chen, J Deng, Y Chen, C Li, X Fang, C Liu, W Xu
IEEE Transactions on Information Forensics and Security, 2025
2025
EL-FDL: Improving Image Forgery Detection and Localization via Ensemble Learning
B Wang, F Wang, J Wang, H Yan, S Zhou, C Li
International Conference on Artificial Neural Networks, 248-262, 2024
2024
Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification
X Ji, Q Jiang, C Li, Z Shi, W Xu
IEEE Transactions on Information Forensics and Security 19, 3366-3379, 2024
2024
基于剪枝技术和鲁棒蒸馏融合的轻量对抗攻击防御方法
王滨, 李思敏, 钱亚冠, 张君, 李超豪, 朱晨鸣, 张鸿飞
网络与信息安全学报 8 (6), 102-109, 2022
2022
物联网邻近交互安全关键技术研究
李超豪
浙江大学, 2021
2021
Poster: Blue Note-How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems
C Bolton, S Rampazzi, C Li, A Kwong, W Xu, K Fu
系统目前无法执行此操作,请稍后再试。
文章 1–16