What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Feng Lin
Google Scholar
ORCID:
0000-0001-5240-5200
22
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
DroneAudioID: A Lightweight Acoustic Fingerprint-Based Drone Authentication System for Secure Drone Delivery.
Meng Zhang
Li Lu
Yuhan Wu
Zheng Yan
Jiaqi Sun
Feng Lin
Kui Ren
2025
journals/tifs
Adversarial Self-Supervised Learning for Secure and Robust Urban Region Profiling.
Weiliang Chen
Qianqian Ren
Yong Liu
Jianguo Sun
Feng Lin
2025
journals/tifs
Liquid Crystal Mimics Your Heart: A Physical Spoofing Attack Against PPG-Based Systems.
Junhao Wang
Li Lu
Hao Kong
Feng Lin
Zhongjie Ba
Kui Ren
2024
journals/tifs
AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception.
Meng Chen
Li Lu
Jiadi Yu
Zhongjie Ba
Feng Lin
Kui Ren
2024
journals/tifs
PhaDe: Practical Phantom Spoofing Attack Detection for Autonomous Vehicles.
Feng Lin
Hao Yan
Jin Li
Ziwei Liu
Li Lu
Zhongjie Ba
Kui Ren
2024
journals/tifs
Indelible "Footprints" of Inaudible Command Injection.
Zhongjie Ba
Bin Gong
Yuwei Wang
Yuxuan Liu
Peng Cheng
Feng Lin
Li Lu
Kui Ren
2024
journals/tifs
FLTracer: Accurate Poisoning Attack Provenance in Federated Learning.
Xinyu Zhang
Qingyu Liu
Zhongjie Ba
Yuan Hong
Tianhang Zheng
Feng Lin
Li Lu
Kui Ren
2024
conf/ccs
ERASER: Machine Unlearning in MLaaS via an Inference Serving-Aware Approach.
Yuke Hu
Jian Lou
Jiaqi Liu
Wangze Ni
Feng Lin
Zhan Qin
Kui Ren
2024
conf/uss
MicGuard: A Comprehensive Detection System against Out-of-band Injection Attacks for Different Level Microphone-based Devices.
Tiantian Liu
Feng Lin
Zhongjie Ba
Li Lu
Zhan Qin
Kui Ren
2024
conf/uss
FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition.
Kun Wang
Xiangyu Xu
Li Lu
Zhongjie Ba
Feng Lin
Kui Ren
2024
conf/uss
VibSpeech: Exploring Practical Wideband Eavesdropping via Bandlimited Signal of Vibration-based Side Channel.
Chao Wang
Feng Lin
Hao Yan
Tong Wu
Wenyao Xu
Kui Ren
2024
conf/uss
Devil in the Room: Triggering Audio Backdoors in the Physical World.
Meng Chen
Xiangyu Xu
Li Lu
Zhongjie Ba
Feng Lin
Kui Ren
2024
conf/sp
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features.
Peng Cheng
Yuwei Wang
Peng Huang
Zhongjie Ba
Xiaodong Lin
Feng Lin
Li Lu
Kui Ren
2023
conf/ccs
FITS: Matching Camera Fingerprints Subject to Software Noise Pollution.
Liu Liu
Xinwen Fu
Xiaodong Chen
Jianpeng Wang
Zhongjie Ba
Feng Lin
Li Lu
Kui Ren
2023
conf/sp
MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.
Tiantian Liu
Feng Lin
Zhangsen Wang
Chao Wang
Zhongjie Ba
Li Lu
Wenyao Xu
Kui Ren
2023
conf/ndss
InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise.
Peng Huang
Yao Wei
Peng Cheng
Zhongjie Ba
Li Lu
Feng Lin
Fan Zhang
Kui Ren
2023
conf/ndss
MetaWave: Attacking mmWave Sensing with Meta-material-enhanced Tags.
Xingyu Chen
Zhengxiong Li
Baicheng Chen
Yi Zhu
Chris Xiaoxuan Lu
Zhengyu Peng
Feng Lin
Wenyao Xu
Kui Ren
Chunming Qiao
2022
conf/ndss
SpiralSpy: Exploring a Stealthy and Practical Covert Channel to Attack Air-gapped Computing Devices via mmWave Sensing.
Zhengxiong Li
Baicheng Chen
Xingyu Chen
Huining Li
Chenhan Xu
Feng Lin
Chris Xiaoxuan Lu
Kui Ren
Wenyao Xu
2022
conf/ndss
FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in Commercial Fingerprint Anti-Spoofing.
Aditya Singh Rathore
Yijie Shen
Chenhan Xu
Jacob Snyderman
Jinsong Han
Fan Zhang
Zhengxiong Li
Feng Lin
Wenyao Xu
Kui Ren
2021
journals/tifs
Injecting Reliable Radio Frequency Fingerprints Using Metasurface for the Internet of Things.
Sekhar Rajendran
Zhi Sun
Feng Lin
Kui Ren
2020
conf/ndss
OcuLock: Exploring Human Visual System for Authentication in Virtual Reality Head-mounted Display.
Shiqing Luo
Anh Nguyen
Chen Song
Feng Lin
Wenyao Xu
Zhisheng Yan
2016
conf/ccs
My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers.
Chen Song
Feng Lin
Zhongjie Ba
Kui Ren
Chi Zhou
Wenyao Xu
Coauthors
Aditya Singh Rathore
(1)
Anh Nguyen
(1)
Baicheng Chen
(2)
Bin Gong
(1)
Chao Wang
(2)
Chen Song
(2)
Chenhan Xu
(2)
Chi Zhou
(1)
Chris Xiaoxuan Lu
(2)
Chunming Qiao
(1)
Fan Zhang
(2)
Feng Lin
(22)
Hao Kong
(1)
Hao Yan
(2)
Huining Li
(1)
Jacob Snyderman
(1)
Jiadi Yu
(1)
Jian Lou
(1)
Jianguo Sun
(1)
Jianpeng Wang
(1)
Jiaqi Liu
(1)
Jiaqi Sun
(1)
Jin Li
(1)
Jinsong Han
(1)
Junhao Wang
(1)
Kui Ren
(20)
Kun Wang
(1)
Li Lu
(13)
Liu Liu
(1)
Meng Chen
(2)
Meng Zhang
(1)
Peng Cheng
(3)
Peng Huang
(2)
Qianqian Ren
(1)
Qingyu Liu
(1)
Sekhar Rajendran
(1)
Shiqing Luo
(1)
Tianhang Zheng
(1)
Tiantian Liu
(2)
Tong Wu
(1)
Wangze Ni
(1)
Weiliang Chen
(1)
Wenyao Xu
(7)
Xiangyu Xu
(2)
Xiaodong Chen
(1)
Xiaodong Lin
(1)
Xingyu Chen
(2)
Xinwen Fu
(1)
Xinyu Zhang
(1)
Yao Wei
(1)
Yi Zhu
(1)
Yijie Shen
(1)
Yong Liu
(1)
Yuan Hong
(1)
Yuhan Wu
(1)
Yuke Hu
(1)
Yuwei Wang
(2)
Yuxuan Liu
(1)
Zhan Qin
(2)
Zhangsen Wang
(1)
Zheng Yan
(1)
Zhengxiong Li
(3)
Zhengyu Peng
(1)
Zhi Sun
(1)
Zhisheng Yan
(1)
Zhongjie Ba
(13)
Ziwei Liu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to