Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. R Schlegel, K Zhang, X Zhou, M Intwala, A Kapadia, XF Wang Proceedings of the 18th Annual Network & Distributed System Security …, 2011 | 602 | 2011 |
Side-channel leaks in web applications: A reality today, a challenge tomorrow S Chen, R Wang, XF Wang, K Zhang 2010 IEEE Symposium on Security and Privacy, 191-206, 2010 | 549 | 2010 |
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing KZ Jiongyi Chen, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin ... The 25th Annual Network and Distributed System Security Symposium, 2018 | 405* | 2018 |
Knowing your enemy: understanding and detecting malicious web advertising Z Li, K Zhang, Y Xie, F Yu, XF Wang Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 322 | 2012 |
Sedic: privacy-aware data intensive computing on hybrid clouds K Zhang, X Zhou, Y Chen, XF Wang, Y Ruan Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 285 | 2011 |
When good becomes evil: Keystroke inference with smartwatch X Liu, Z Zhou, W Diao, Z Li, K Zhang Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 240 | 2015 |
Your voice assistant is mine: how to abuse speakers to steal information and control your phone W Diao, X Liu, Z Zhou, K Zhang Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014 | 208 | 2014 |
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection. D Tang, XF Wang, H Tang, K Zhang USENIX Security Symposium, 1541-1558, 2021 | 189 | 2021 |
Understanding android obfuscation techniques: A large-scale investigation in the wild S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang Security and Privacy in Communication Networks: 14th International …, 2018 | 155 | 2018 |
Peeping tom in the neighborhood: keystroke eavesdropping on multi-user systems K Zhang, XF Wang Proceedings of the 18th conference on USENIX security symposium, Pages 17-32, 2009 | 149 | 2009 |
Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound Z Zhou, W Diao, X Liu, K Zhang Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 127 | 2014 |
A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding J Zhang, Z Qin, H Yin, L Ou, K Zhang Computers & Security 84, 376-392, 2019 | 106 | 2019 |
On Code Execution Tracking via Power Side-Channel Y Liu, L Wei, Z Zhou, K Zhang, W Xu, Q Xu Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 98 | 2016 |
Invisible mask: Practical attacks on face recognition with infrared Z Zhou, D Tang, X Wang, W Han, X Liu, K Zhang CoRR abs/1803.04683 (2018), 2018 | 93 | 2018 |
Sidebuster: automated detection and quantification of side-channel leaks in web application development K Zhang, Z Li, R Wang, XF Wang, S Chen Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 85 | 2010 |
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ... arXiv preprint arXiv:1703.09809, 2017 | 82 | 2017 |
No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis W Diao, X Liu, Z Li, K Zhang Proceeding of the 37th IEEE Symposium on Security and Privacy (Oakland'16), 2016 | 73 | 2016 |
Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections D Tang, Z Zhou, Y Zhang, K Zhang Network and Distributed Systems Security (NDSS) Symposium 2018, 2018 | 71 | 2018 |
Stealthy porn: Understanding real-world adversarial images for illicit online promotion K Yuan, D Tang, X Liao, XF Wang, X Feng, Y Chen, M Sun, H Lu, K Zhang 2019 IEEE Symposium on Security and Privacy (SP), 952-966, 2019 | 65 | 2019 |
Model-based Security Testing: An Empirical Study on OAuth 2.0 Implementations R Yang, G Li, WC Lau, K Zhang, P Hu Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 63 | 2016 |