What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Xiaoyu Ji
Google Scholar
ORCID:
0000-0002-1101-0007
46
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
PowerRadio: Manipulate Sensor Measurement via Power GND Radiation.
Yan Jiang
Xiaoyu Ji
Yancheng Jiang
Kai Wang
Chenren Xu
Wenyuan Xu
2025
conf/ndss
GhostShot: Manipulating the Image of CCD Cameras with Electromagnetic Interference.
Yanze Ren
Qinhong Jiang
Chen Yan
Xiaoyu Ji
Wenyuan Xu
2025
conf/ndss
ReThink: Reveal the Threat of Electromagnetic Interference on Power Inverters.
Fengchen Yang
Zihao Dan
Kaikai Pan
Chen Yan
Xiaoyu Ji
Wenyuan Xu
2025
conf/ndss
PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR.
Zizhi Jin
Qinhong Jiang
Xuancun Lu
Chen Yan
Xiaoyu Ji
Wenyuan Xu
2025
conf/ndss
LightAntenna: Characterizing the Limits of Fluorescent Lamp-Induced Electromagnetic Interference.
Fengchen Yang
Wenze Cui
Xinfeng Li
Chen Yan
Xiaoyu Ji
Wenyuan Xu
2025
conf/uss
Neural Invisibility Cloak: Concealing Adversary in Images via Compromised AI-driven Image Signal Processing.
Wenjun Zhu
Xiaoyu Ji
Xinfeng Li
Qihang Chen
Kun Wang
Xinyu Li
Ruoyan Xu
Wenyuan Xu
2024
journals/tifs
Dr. Defender: Proactive Detection of Autopilot Drones Based on CSI.
Jiangyi Deng
Xiaoyu Ji
Beibei Wang
Bin Wang
Wenyuan Xu
2024
journals/tifs
Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification.
Xiaoyu Ji
Qinhong Jiang
Chaohao Li
Zhuoyang Shi
Wenyuan Xu
2024
conf/ccs
SafeEar: Content Privacy-Preserving Audio Deepfake Detection.
Xinfeng Li
Kai Li
Yifan Zheng
Chen Yan
Xiaoyu Ji
Wenyuan Xu
2024
conf/ccs
Watch the Rhythm: Breaking Privacy with Accelerometer at the Extremely-Low Sampling Rate of 5Hz.
Qingsong Yao
Yuming Liu
Xiongjia Sun
Xuewen Dong
Xiaoyu Ji
Jianfeng Ma
2024
conf/ccs
SafeGen: Mitigating Sexually Explicit Content Generation in Text-to-Image Models.
Xinfeng Li
Yuchen Yang
Jiangyi Deng
Chen Yan
Yanjiao Chen
Xiaoyu Ji
Wenyuan Xu
2024
conf/uss
LaserAdv: Laser Adversarial Attacks on Speech Recognition Systems.
Guoming Zhang
Xiaohui Ma
Huiting Zhang
Zhijie Xiang
Xiaoyu Ji
Yanni Yang
Xiuzhen Cheng
Pengfei Hu
2024
conf/sp
Understanding and Benchmarking the Commonality of Adversarial Examples.
Ruiwen He
Yushi Cheng
Junning Ze
Xiaoyu Ji
Wenyuan Xu
2024
conf/ndss
UniID: Spoofing Face Authentication System by Universal Identity.
Zhihao Wu
Yushi Cheng
Shibo Zhang
Xiaoyu Ji
Wenyuan Xu
2024
conf/ndss
EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras.
Yan Long
Qinhong Jiang
Chen Yan
Tobias Alam
Xiaoyu Ji
Wenyuan Xu
Kevin Fu
2024
conf/ndss
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards.
Qinhong Jiang
Yanze Ren
Yan Long
Chen Yan
Yumai Sun
Xiaoyu Ji
Kevin Fu
Wenyuan Xu
2024
conf/ndss
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time.
Xinfeng Li
Chen Yan
Xuancun Lu
Zihan Zeng
Xiaoyu Ji
Wenyuan Xu
2024
conf/ndss
CamPro: Camera-based Anti-Facial Recognition.
Wenjun Zhu
Yuan Sun
Jiani Liu
Yushi Cheng
Xiaoyu Ji
Wenyuan Xu
2023
conf/ccs
MicPro: Microphone-based Voice Privacy Protection.
Shilin Xiao
Xiaoyu Ji
Chen Yan
Zhicong Zheng
Wenyuan Xu
2023
conf/uss
TPatch: A Triggered Physical Adversarial Patch.
Wenjun Zhu
Xiaoyu Ji
Yushi Cheng
Shibo Zhang
Wenyuan Xu
2023
conf/uss
GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI.
Qinhong Jiang
Xiaoyu Ji
Chen Yan
Zhixin Xie
Haina Lou
Wenyuan Xu
2023
conf/uss
Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks.
Xinfeng Li
Xiaoyu Ji
Chen Yan
Chaohao Li
Yichen Li
Zhenning Zhang
Wenyuan Xu
2023
conf/uss
CAPatch: Physical Adversarial Patch against Image Captioning Systems.
Shibo Zhang
Yushi Cheng
Wenjun Zhu
Xiaoyu Ji
Wenyuan Xu
2023
conf/uss
Remote Attacks on Speech Recognition Systems Using Sound from Power Supply.
Lanqing Yang
Xinqi Chen
Xiangyong Jian
Leping Yang
Yijie Li
Qianfei Ren
Yi-Chao Chen
Guangtao Xue
Xiaoyu Ji
2023
conf/sp
DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation.
Ruochen Zhou
Xiaoyu Ji
Chen Yan
Yi-Chao Chen
Wenyuan Xu
Chaohao Li
2023
conf/sp
DepthFake: Spoofing 3D Face Authentication with a 2D Photo.
Zhihao Wu
Yushi Cheng
Jiahui Yang
Xiaoyu Ji
Wenyuan Xu
2023
conf/sp
PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle.
Zizhi Jin
Xiaoyu Ji
Yushi Cheng
Bo Yang
Chen Yan
Wenyuan Xu
2023
conf/sp
Volttack: Control IoT Devices by Manipulating Power Supply Voltage.
Kai Wang
Shilin Xiao
Xiaoyu Ji
Chen Yan
Chaohao Li
Wenyuan Xu
2022
journals/tifs
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication.
Jiayu Zhang
Min Li
Min-Jian Zhao
Xiaoyu Ji
Wenyuan Xu
2022
conf/uss
GhostTouch: Targeted Attacks on Touchscreens without Physical Touch.
Kai Wang
Richard Mitev
Chen Yan
Xiaoyu Ji
Ahmad-Reza Sadeghi
Wenyuan Xu
2022
conf/uss
"OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score.
Ruiwen He
Xiaoyu Ji
Xinfeng Li
Yushi Cheng
Wenyuan Xu
2022
conf/uss
Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition.
Chen Yan
Zhijian Xu
Zhanyuan Yin
Xiaoyu Ji
Wenyuan Xu
2022
conf/sp
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens.
Yan Jiang
Xiaoyu Ji
Kai Wang
Chen Yan
Richard Mitev
Ahmad-Reza Sadeghi
Wenyuan Xu
2021
conf/ccs
CapSpeaker: Injecting Voices to Microphones via Capacitors.
Xiaoyu Ji
Juchuan Zhang
Shui Jiang
Jishen Li
Wenyuan Xu
2021
conf/uss
mID: Tracing Screen Photos via Moiré Patterns.
Yushi Cheng
Xiaoyu Ji
Lixu Wang
Qi Pang
Yi-Chao Chen
Wenyuan Xu
2021
conf/sp
Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision.
Xiaoyu Ji
Yushi Cheng
Yuepeng Zhang
Kai Wang
Chen Yan
Wenyuan Xu
Kevin Fu
2021
conf/ndss
EarArray: Defending against DolphinAttack via Acoustic Attenuation.
Guoming Zhang
Xiaoyu Ji
Xinfeng Li
Gang Qu
Wenyuan Xu
2021
conf/dsn
SMS Goes Nuclear: Fortifying SMS-Based MFA in Online Account Ecosystem.
Weizhao Jin
Xiaoyu Ji
Ruiwen He
Zhou Zhuang
Wenyuan Xu
Yuan Tian
2021
conf/wisec
OutletSpy: cross-outlet application inference via power factor correction signal.
Juchuan Zhang
Xiaoyu Ji
Yuehan Chi
Yi-Chao Chen
Bin Wang
Wenyuan Xu
2019
conf/ccs
DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU.
Yushi Cheng
Xiaoyu Ji
Juchuan Zhang
Wenyuan Xu
Yi-Chao Chen
2019
conf/ccs
The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification.
Chen Yan
Yan Long
Xiaoyu Ji
Wenyuan Xu
2019
conf/ccs
MagAttack: Guessing Application Launching and Operation via Smartphone.
Yushi Cheng
Xiaoyu Ji
Wenyuan Xu
Hao Pan
Zhuangdi Zhu
Chuang-Wen You
Yi-Chao Chen
Lili Qiu
2018
conf/ccs
DeWiCam: Detecting Hidden Wireless Cameras via Smartphones.
Yushi Cheng
Xiaoyu Ji
Tianyang Lu
Wenyuan Xu
2018
conf/ccs
HlcAuth: Key-free and Secure Communications via Home-Limited Channel.
Chaohao Li
Xiaoyu Ji
Xinyan Zhou
Juchuan Zhang
Jing Tian
Yanmiao Zhang
Wenyuan Xu
2018
conf/ccs
FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting.
Zhou Zhuang
Xiaoyu Ji
Taimin Zhang
Juchuan Zhang
Wenyuan Xu
Zhenhua Li
Yunhao Liu
2017
conf/ccs
DolphinAttack: Inaudible Voice Commands.
Guoming Zhang
Chen Yan
Xiaoyu Ji
Tianchen Zhang
Taimin Zhang
Wenyuan Xu
Coauthors
Ahmad-Reza Sadeghi
(2)
Beibei Wang
(1)
Bin Wang
(2)
Bo Yang
(1)
Chaohao Li
(5)
Chen Yan
(21)
Chenren Xu
(1)
Chuang-Wen You
(1)
Fengchen Yang
(2)
Gang Qu
(1)
Guangtao Xue
(1)
Guoming Zhang
(3)
Haina Lou
(1)
Hao Pan
(1)
Huiting Zhang
(1)
Jiahui Yang
(1)
Jianfeng Ma
(1)
Jiangyi Deng
(2)
Jiani Liu
(1)
Jiayu Zhang
(1)
Jing Tian
(1)
Jishen Li
(1)
Juchuan Zhang
(5)
Junning Ze
(1)
Kai Li
(1)
Kai Wang
(5)
Kaikai Pan
(1)
Kevin Fu
(3)
Kun Wang
(1)
Lanqing Yang
(1)
Leping Yang
(1)
Lili Qiu
(1)
Lixu Wang
(1)
Min Li
(1)
Min-Jian Zhao
(1)
Pengfei Hu
(1)
Qi Pang
(1)
Qianfei Ren
(1)
Qihang Chen
(1)
Qingsong Yao
(1)
Qinhong Jiang
(6)
Richard Mitev
(2)
Ruiwen He
(3)
Ruochen Zhou
(1)
Ruoyan Xu
(1)
Shibo Zhang
(3)
Shilin Xiao
(2)
Shui Jiang
(1)
Taimin Zhang
(2)
Tianchen Zhang
(1)
Tianyang Lu
(1)
Tobias Alam
(1)
Weizhao Jin
(1)
Wenjun Zhu
(4)
Wenyuan Xu
(43)
Wenze Cui
(1)
Xiangyong Jian
(1)
Xiaohui Ma
(1)
Xiaoyu Ji
(46)
Xinfeng Li
(8)
Xinqi Chen
(1)
Xinyan Zhou
(1)
Xinyu Li
(1)
Xiongjia Sun
(1)
Xiuzhen Cheng
(1)
Xuancun Lu
(2)
Xuewen Dong
(1)
Yan Jiang
(2)
Yan Long
(3)
Yancheng Jiang
(1)
Yanjiao Chen
(1)
Yanmiao Zhang
(1)
Yanni Yang
(1)
Yanze Ren
(2)
Yi-Chao Chen
(6)
Yichen Li
(1)
Yifan Zheng
(1)
Yijie Li
(1)
Yuan Sun
(1)
Yuan Tian
(1)
Yuchen Yang
(1)
Yuehan Chi
(1)
Yuepeng Zhang
(1)
Yumai Sun
(1)
Yuming Liu
(1)
Yunhao Liu
(1)
Yushi Cheng
(13)
Zhanyuan Yin
(1)
Zhenhua Li
(1)
Zhenning Zhang
(1)
Zhicong Zheng
(1)
Zhihao Wu
(2)
Zhijian Xu
(1)
Zhijie Xiang
(1)
Zhixin Xie
(1)
Zhou Zhuang
(2)
Zhuangdi Zhu
(1)
Zhuoyang Shi
(1)
Zihan Zeng
(1)
Zihao Dan
(1)
Zizhi Jin
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to