[HTML][HTML] Object detection under the lens of privacy: A critical survey of methods, challenges, and future directions

J Moon, M Bukhari, C Kim, Y Nam, M Maqsood, S Rho - ICT Express, 2024 - Elsevier
This paper presents critical surveillance system functions and considers advances and
challenges for privacy and ethical implications. We examine privacy-protection strategies …

Masterkey: Practical backdoor attack against speaker verification systems

H Guo, X Chen, J Guo, L Xiao, Q Yan - Proceedings of the 29th Annual …, 2023 - dl.acm.org
Speaker Verification (SV) is widely deployed in mobile systems to authenticate legitimate
users by using their voice traits. In this work, we propose a backdoor attack MasterKey, to …

Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel

T Ni, X Zhang, Q Zhao - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Recently, in-display fingerprint sensors have been widely adopted in newly-released
smartphones. However, we find this new technique can leak information about the user's …

Survey of Side-Channel Vulnerabilities for Short-Range Wireless Communication Technologies

S Beck, M Raavi, C Dale, K Weishalla… - … Conference on Electro …, 2024 - ieeexplore.ieee.org
Short-range wireless communications have become a part of everyday human life and
protecting the security and privacy of user data is the primary goal in this digital era. Multiple …

CP-Guard: Malicious Agent Detection and Defense in Collaborative Bird's Eye View Perception

S Hu, Y Tao, G Xu, Y Deng, X Chen, Y Fang… - arXiv preprint arXiv …, 2024 - arxiv.org
Collaborative Perception (CP) has shown a promising technique for autonomous driving,
where multiple connected and autonomous vehicles (CAVs) share their perception …

REHSense: Towards Battery-Free Wireless Sensing via Radio Frequency Energy Harvesting

T Ni, Z Sun, M Han, Y Xie, G Lan, Z Li, T Gu… - Proceedings of the …, 2024 - dl.acm.org
Diverse Wi-Fi-based wireless applications have been proposed, ranging from daily activity
recognition to vital sign monitoring. Despite their remarkable sensing accuracy, the high …

MagSpy: Revealing User Privacy Leakage via Magnetometer on Mobile Devices

Y Fu, L Yang, H Pan, YC Chen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Various characteristics of mobile applications (apps) and associated in-app services can
reveal potentially-sensitive user information; however, privacy concerns have prompted third …

XPorter: A study of the multi-port charger security on privacy leakage and voice injection

T Ni, Y Chen, W Xu, L Xue, Q Zhao - Proceedings of the 29th Annual …, 2023 - dl.acm.org
Multi-port chargers, capable of simultaneously charging multiple mobile devices such as
smartphones, have gained immense popularity and sold millions of units in recent years …

Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation

R Zhou, X Ji, H Chen, C Yan, W Xu - ACM Transactions on Sensor …, 2024 - dl.acm.org
Unauthorized covert voice recording presents a significant threat to privacy-sensitive
scenarios, such as confidential meetings and private conversations. Due to their …

FLoRa+: Energy-efficient, Reliable, Beamforming-assisted, and Secure Over-the-air Firmware Update in LoRa Networks

Z Sun, T Ni, H Yang, K Liu, Y Zhang, T Gu… - ACM Transactions on …, 2024 - dl.acm.org
The widespread deployment of unattended LoRa networks poses a growing need to perform
Firmware Updates Over-The-Air (FUOTA). However, the FUOTA specifications dedicated by …