Dolphinattack: Inaudible voice commands G Zhang, C Yan, X Ji, T Zhang, T Zhang, W Xu Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 879 | 2017 |
The feasibility of injecting inaudible voice commands to voice assistants C Yan, G Zhang, X Ji, T Zhang, T Zhang, W Xu IEEE Transactions on Dependable and Secure Computing 18 (3), 1108-1124, 2019 | 74 | 2019 |
EarArray: Defending against DolphinAttack via Acoustic Attenuation. G Zhang, X Ji, X Li, G Qu, W Xu NDSS, 2021 | 35 | 2021 |
Accear: Accelerometer acoustic eavesdropping with unconstrained vocabulary P Hu, H Zhuang, PS Santhalingam, R Spolaor, P Pathak, G Zhang, ... 2022 IEEE Symposium on Security and Privacy (SP), 1757-1773, 2022 | 27 | 2022 |
Malware-on-the-brain: Illuminating malware byte codes with images for malware classification F Zhong, Z Chen, M Xu, G Zhang, D Yu, X Cheng IEEE Transactions on computers 72 (2), 438-451, 2022 | 24 | 2022 |
ADDP: anomaly detection for DTU based on power consumption side-channel A Xu, Y Jiang, Y Cao, G Zhang, X Ji, W Xu 2019 IEEE 3rd Conference on Energy Internet and Energy System Integration …, 2019 | 11 | 2019 |
Towards unconstrained vocabulary eavesdropping with mmwave radar using gan P Hu, W Li, Y Ma, PS Santhalingam, P Pathak, H Li, H Zhang, G Zhang, ... IEEE Transactions on Mobile Computing 23 (1), 941-954, 2022 | 9 | 2022 |
Reinforcement learning based adversarial malware example generation against black-box detectors F Zhong, P Hu, G Zhang, H Li, X Cheng Computers & Security 121, 102869, 2022 | 9 | 2022 |
Method of defending against inaudible attacks on voice assistant based on machine learning W Xu, JI Xiaoyu, G Zhang, C Yan, T Zhang, T Zhang US Patent 11,450,324, 2022 | 8 | 2022 |
UltraComm: High-speed and inaudible acoustic communication G Zhang, X Ji, X Zhou, D Qi, W Xu International Conference on Heterogeneous Networking for Quality …, 2019 | 6 | 2019 |
Power-based non-intrusive condition monitoring for terminal device in smart grid G Zhang, X Ji, Y Li, W Xu Sensors 20 (13), 3635, 2020 | 5 | 2020 |
Power consumption-based anomaly detection for relay protection H Dai, X Sun, J Li, G Zhang, X Ji, W Xu 2020 IEEE 4th Information Technology, Networking, Electronic and Automation …, 2020 | 5 | 2020 |
Evaluation and defense of light commands attacks against voice controllable systems in smart cars Z Xu, G Zhang, X Ji, W Xu Noise & Vibration Worldwide 52 (4-5), 113-123, 2021 | 4 | 2021 |
TraceDroid: Detecting Android Malware by Trace of Privacy Leakage Y Wu, H Fu, G Zhang, B Zhao, M Xu, Y Zou, X Feng, P Hu International Conference on Wireless Algorithms, Systems, and Applications …, 2022 | 3 | 2022 |
UltraJam: Ultrasonic adaptive jammer based on nonlinearity effect of microphone circuits Z Han, J Ma, C Xu, G Zhang High-Confidence Computing 3 (3), 100129, 2023 | 2 | 2023 |
Nfchain: A practical fingerprinting scheme for nfc tag authentication Y Yang, J Cao, Z An, Y Wang, P Hu, G Zhang IEEE INFOCOM 2023-IEEE Conference on Computer Communications, 1-10, 2023 | 2 | 2023 |
Accurate contact-free material recognition with millimeter wave and machine learning S He, Y Qian, H Zhang, G Zhang, M Xu, L Fu, X Cheng, H Wang, P Hu International Conference on Wireless Algorithms, Systems, and Applications …, 2022 | 1 | 2022 |
Poisson-Gamma Dynamical Systems with Non-Stationary Transition Dynamics J Wang, S Yang, H Koeppl, X Cheng, P Hu, G Zhang arXiv preprint arXiv:2402.16297, 2024 | | 2024 |
Ultrasound Communication Using the Nonlinearity Effect of Microphone Circuits in Smart Devices G Zhang, X Ji, X Zhou, D Qi, W Xu ACM Transactions on Sensor Networks 20 (3), 1-22, 2024 | | 2024 |
Detecting Inaudible Voice Commands via Acoustic Attenuation by Multi-channel Microphones X Ji, G Zhang, X Li, G Qu, X Cheng, W Xu IEEE Transactions on Dependable and Secure Computing, 2024 | | 2024 |