Follow
Zhongjie Ba
Zhongjie Ba
Verified email at zju.edu.cn
Title
Cited by
Cited by
Year
My smartphone knows what you print: Exploring smartphone-based side-channel attacks against 3d printers
C Song, F Lin, Z Ba, K Ren, C Zhou, W Xu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1472016
Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer.
Z Ba, T Zheng, X Zhang, Z Qin, B Li, X Liu, K Ren
NDSS 2020, 1-18, 2020
1182020
Avoid-df: Audio-visual joint learning for detecting deepfake
W Yang, X Zhou, Z Chen, B Guo, Z Ba, Z Xia, X Cao, K Ren
IEEE Transactions on Information Forensics and Security 18, 2015-2029, 2023
892023
Wavoice: A noise-resistant multi-modal speech recognition system fusing mmwave and audio signals
T Liu, M Gao, F Lin, C Wang, Z Ba, J Han, W Xu, K Ren
Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems …, 2021
812021
Towards query-efficient adversarial attacks against automatic speech recognition systems
Q Wang, B Zheng, Q Li, C Shen, Z Ba
IEEE Transactions on Information Forensics and Security 16, 896-908, 2020
672020
ABC: Enabling smartphone authentication with built-in camera
Z Ba, S Piao, X Fu, D Koutsonikolas, A Mohaisen, K Ren
25th Annual Network and Distributed System Security Symposium, NDSS 2018, 2018
462018
Automating CSI measurement with UAVs: From problem formulation to energy-optimal solution
S Piao, Z Ba, L Su, D Koutsonikolas, S Li, K Ren
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2404-2412, 2019
402019
mmphone: Acoustic eavesdropping on loudspeakers via mmwave-characterized piezoelectric effect
C Wang, F Lin, T Liu, Z Liu, Y Shen, Z Ba, L Lu, W Xu, K Ren
IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 820-829, 2022
362022
Locate and verify: A two-stream network for improved deepfake detection
C Shuai, J Zhong, S Wu, F Lin, Z Wang, Z Ba, Z Liu, L Cavallaro, K Ren
Proceedings of the 31st ACM International Conference on Multimedia, 7131-7142, 2023
252023
Wavesdropper: Through-wall word detection of human speech via commercial mmWave devices
C Wang, F Lin, Z Ba, F Zhang, W Xu, K Ren
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2022
242022
Privacyasst: Safeguarding user privacy in tool-using large language model agents
X Zhang, H Xu, Z Ba, Z Wang, Y Hong, J Liu, Z Qin, K Ren
IEEE Transactions on Dependable and Secure Computing, 2024
232024
Transferring audio deepfake detection capability across languages
Z Ba, Q Wen, P Cheng, Y Wang, F Lin, L Lu, Z Liu
Proceedings of the ACM Web Conference 2023, 2033-2044, 2023
232023
Camradar: Hidden camera detection leveraging amplitude-modulated sensor images embedded in electromagnetic emanations
Z Liu, F Lin, C Wang, Y Shen, Z Ba, L Lu, W Xu, K Ren
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2023
202023
Text-crs: A generalized certified robustness framework against textual adversarial attacks
X Zhang, H Hong, Y Hong, P Huang, B Wang, Z Ba, K Ren
2024 IEEE Symposium on Security and Privacy (SP), 2920-2938, 2024
182024
Exposing the deception: Uncovering more forgery clues for deepfake detection
Z Ba, Q Liu, Z Liu, S Wu, F Lin, L Lu, K Ren
Proceedings of the AAAI Conference on Artificial Intelligence 38 (2), 719-728, 2024
182024
PhoneyTalker: An out-of-the-box toolkit for adversarial example attack on speaker recognition
M Chen, L Lu, Z Ba, K Ren
IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 1419-1428, 2022
172022
Is imitation all you need? generalized decision-making with dual-phase training
Y Wei, Y Sun, R Zheng, S Vemprala, R Bonatti, S Chen, R Madaan, Z Ba, ...
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023
162023
Toward hardware-rooted smartphone authentication
K Ren, Z Qin, Z Ba
IEEE Wireless Communications 26 (1), 114-119, 2019
162019
Dfil: Deepfake incremental learning by exploiting domain-invariant forgery clues
K Pan, Y Yin, Y Wei, F Lin, Z Ba, Z Liu, Z Wang, L Cavallaro, K Ren
Proceedings of the 31st ACM International Conference on Multimedia, 8035-8046, 2023
152023
Magbackdoor: Beware of your loudspeaker as a backdoor for magnetic injection attacks
T Liu, F Lin, Z Wang, C Wang, Z Ba, L Lu, W Xu, K Ren
2023 IEEE Symposium on Security and Privacy (SP), 3416-3431, 2023
132023
The system can't perform the operation now. Try again later.
Articles 1–20