Follow
Xiaoyu Ji
Xiaoyu Ji
Associate Professor, Zhejiang University
Verified email at zju.edu.cn - Homepage
Title
Cited by
Cited by
Year
Dolphinatack: Inaudible voice commands
G Zhang, C Yan, X Ji, T Zhang, T Zhang, W Xu
ACM CCS 2017, 2017
8242017
Analyzing and enhancing the security of ultrasonic sensors for autonomous vehicles
W Xu, C Yan, W Jia, X Ji, J Liu
IEEE Internet of Things Journal 5 (6), 5015-5029, 2018
1602018
The catcher in the field: A fieldprint based spoofing detection for text-independent speaker verification
C Yan, Y Long, X Ji, W Xu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
652019
The feasibility of injecting inaudible voice commands to voice assistants
C Yan, G Zhang, X Ji, T Zhang, T Zhang, W Xu
IEEE Transactions on Dependable and Secure Computing 18 (3), 1108-1124, 2019
642019
Fbsleuth: Fake base station forensics via radio frequency fingerprinting
Z Zhuang, X Ji, T Zhang, J Zhang, W Xu, Z Li, Y Liu
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
622018
Energy efficient link-delay aware routing in wireless sensor networks
X Lai, X Ji, X Zhou, L Chen
IEEE Sensors Journal 18 (2), 837-848, 2017
622017
Dewicam: Detecting hidden wireless cameras via smartphones
Y Cheng, X Ji, T Lu, W Xu
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
562018
Demicpu: Device fingerprinting with magnetic signals radiated by cpu
Y Cheng, X Ji, J Zhang, W Xu, YC Chen
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
542019
Poltergeist: Acoustic adversarial machine learning against cameras and computer vision
X Ji, Y Cheng, Y Zhang, K Wang, C Yan, W Xu, K Fu
2021 IEEE Symposium on Security and Privacy (SP), 160-175, 2021
432021
Channel-aware rate adaptation for backscatter networks
W Gong, H Liu, J Liu, X Fan, K Liu, Q Ma, X Ji
IEEE/ACM Transactions on Networking 26 (2), 751-764, 2018
432018
Walking down the STAIRS: Efficient collision resolution for wireless sensor networks
X Ji, Y He, J Wang, W Dong, X Wu, Y Liu
INFOCOM, 2014 Proceedings IEEE, 961 - 969, 2014
392014
Privacy-aware High-Quality Map Generation with Participatory Sensing
X Chen, X Wu, XY Li, X JI, Y He, Y Liu
Mobile Computing, IEEE Transactions on, 1, 2015
342015
EarArray: Defending against DolphinAttack via Acoustic Attenuation.
G Zhang, X Ji, X Li, G Qu, W Xu
NDSS, 2021
302021
A survey on voice assistant security: Attacks and countermeasures
C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu
ACM Computing Surveys 55 (4), 1-36, 2022
272022
On Improving Wireless Channel Utilization: A Collision Tolerance-based Approach
X Ji, Y He, J Wang, K Wu, D Liu, K Yi, Y Liu
Mobile Computing, IEEE Transactions on, 2016
272016
On detecting hidden wireless cameras: A traffic pattern-based approach
Y Cheng, X Ji, T Lu, W Xu
IEEE Transactions on Mobile Computing 19 (4), 907-921, 2019
252019
Music-touch shoes: vibrotactile interface for hearing impaired dancers
L Yao, Y Shi, H Chi, X Ji, F Ying
TEI '10 Proceedings of the fourth international conference on Tangible …, 2010
252010
Magattack: Guessing application launching and operation via smartphone
Y Cheng, X Ji, W Xu, H Pan, Z Zhu, CW You, YC Chen, L Qiu
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
242019
Capspeaker: Injecting voices to microphones via capacitors
X Ji, J Zhang, S Jiang, J Li, W Xu
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
232021
Voice over the dins: Improving wireless channel utilization with collision tolerance
X Ji, Y He, J Wang, K Wu, K Yi, Y Liu
Network Protocols (ICNP), 2013 21st IEEE International Conference on, 1-10, 2013
232013
The system can't perform the operation now. Try again later.
Articles 1–20