If you are interested in our research, you can also find the following links with more detailed information!
- Wenyuan Xu: Personal Page
- Xiaoyu Ji: Personal Page
- Yanjiao Chen: Personal Page
- Kaikai Pan: Personal Page
- Chen Yan: Personal Page
Zizhi Jin, Xiaoyu Ji, Yushi Cheng, Bo Yang, Chen Yan, Wenyuan Xu, "PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle", accepted by IEEE Security & Privacy (Oakland), 2023. PDF
Ruochen Zhou, Xiaoyu Ji*, Chen Yan, Yi-Chao Chen, Chaohao Li, Wenyuan Xu, "DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation", accepted by IEEE Security & Privacy (Oakland), 2023. PDF
Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu,"TPatch: A Triggered Physical Adversarial Patch", accepted by USENIX Security Symposium (USENIX Security), 2023. PDF
Xinfeng Li, Xiaoyu Ji, Chen Yan, Chaohao Li, Yichen Li, Zhengning Zhang, Wenyuan Xu,"Learning Normality is Enough: A Software-based Mitigation against the Inaudible Voice Attacks", accepted by USENIX Security Symposium (USENIX Security), 2023. PDF
Qinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou, Wenyuan Xu,"GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI", accepted by USENIX Security Symposium (USENIX Security), 2023. PDF
Yan Jiang, Xiaoyu Ji*, Kai Wang, Chen Yan, Richard Mitev (Technische University of Darmstadt), Ahmad-Reza Sadeghi, Wenyuan Xu*, "WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens", in IEEE Security & Privacy (Oakland) PDF
Ruiwen He, Xiaoyu Ji*, Xinfeng Li, Yushi Cheng, Wenyuan Xu, "OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score", accepted by the 31stt USENIX Security Symposium (USENIX Security), 2022. PDF
Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji*, Ahmad-Reza Sadeghi, and Wenyuan Xu, "GhostTouch: Targeted Attacks on Touchscreens without Physical Touch", accepted by the 31stt USENIX Security Symposium (USENIX Security), 2022. PDF
Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji*, and Wenyuan Xu, "Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition", accepted by the 31stt USENIX Security Symposium (USENIX Security) PDF
Yushi Cheng, Xiaoyu Ji*, Lixu Wang, Qi Pang, Yi-Chao Chen, Wenyuan Xu, "mID: Tracing Screen Photos via Moiré Patterns", in the 30th USENIX Security Symposium (USENIX Security) 2021. PDF
Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, Kevin Fu, "Poltergeist: Acoustic Manipulation of Image Stabilization towards Object Mis-Labeling", in IEEE Security & Privacy (Oakland) 2021 (acceptance ratio: 12.1%). PDF
Guoming Zhang, Xiaoyu Ji*, Xinfeng Li, Gang Qu, Wenyuan Xu, "EarArray: Defending against Dolphinattacks via Acoustic Attenuation", in the Network and Distributed System Security Symposium (NDSS) 2021. PDF PDF
Xiaoyu Ji, Juchuan Zhang, Shui Jiang, Jishen Li, Wenyuan Xu, "CapSpeaker: Injecting Sounds to Microphones via Capacitors", in ACM CCS 2021 (CCS). PDF
Xiaoyu Ji, Yushi Cheng, Wenyuan Xu, Yuehan Chi, Hao Pan, Zhuangdi Zhu, Chuang-Wen You, Yi-Chao Chen, Lili Qiu, "No Seeing is Also Believing: Electromagnetic-emission-based Application Guessing Attacks via Smartphones", in IEEE Transactions on Mobile Computing (TMC). PDF
Juchuan Zhang, Xiaoyu Ji, Yuehan Chi, Yi-chao Chen, Bin Wang, Wenyuan Xu, "OutletSpy: cross-outlet application inference via power factor correction signal", in ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2021. PDF
Weizhao Jin, Xiaoyu Ji*, Ruiwen He, Zhou Zhuang, Wenyuan Xu, Yuan Tian, "SMS Goes Nuclear: Fortifying SMS-Based MFA in Online Account Ecosystem", on Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W) 2021. PDF
Chaohao Li, Xiaoyu Ji*, Bin Wang, Kai Wang, Wenyuan Xu, "SenCS: Enabling Real-time Indoor Proximity Verification via Contextual Similarity Authors", in ACM Transactions on Sensor Networks (ToSN). PDF
J Zhang, X Ji, W Xu, YC Chen, Y Tang, G Qu. "MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding ", in IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 357-366.
C Yan, H Shin, C Bolton, W Xu, Y Kim, K Fu. "SoK: A Minimalist Approach to Formalizing Analog Sensor Security", in 2020 IEEE Symposium on Security and Privacy (SP), 480-495
X Ji, C Li, X Zhou, J Zhang, Y Zhang, W Xu. "Authenticating Smart Home Devices via Home Limited Channels", in ACM Transactions on Internet of Things 1 (4), 1-24
Y Cheng, X Ji, X Li, T Zhang, S Malebary, X Qu, W Xu. "Identifying child users via touchscreen interactions ", in ACM Transactions on Sensor Networks (TOSN) 16 (4), 1-25
X Ji, X Zhou, M Xu, W Xu, Y Dong. "OPCIO: Optimizing Power Consumption for Embedded Devices via GPIO Configuration ", in ACM Transactions on Sensor Networks (TOSN) 16 (2), 1-28
Yushi Cheng, Xiaoyu Ji, Juchuan Zhang, Wenyuan Xu, Yi-Chao Chen. DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security.(CCS2019) PDF
Xinyan Zhou, Xiaoyu Ji, Chen Yan, Jiangyi Deng, Wenyuan Xu. NAuth: Secure Face-to-Face Device Authentication via Nonlinearity. IEEE INFOCOM 2019.
Chen Yan, Yan Long, Xiaoyu Ji, Wenyuan Xu. “The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification”, to appear at ACM Conference on Computer and Communications Security (CCS) 2019.
Chen Yan, Kevin Fu, Wenyuan Xu. “On Cuba, Diplomats, Ultrasound, and Intermodulation Distortion.” Computers in Biology and Medicine 104 (2019): 250-266.
Chen Yan, Guoming Zhang, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu. “The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants”, to appear on IEEE Transactions on Dependable and Secure Computing (TDSC).
Chaohao Li, Xiaoyu Ji, Xinyan Zhou, Juchuan Zhang, Jing Tian, Yanmiao Zhang, Wenyuan Xu. HlcAuth: Key-free and Secure Communications via Home-Limited Channel. ACM Asia Conference on Computer and Communications Security, 2018.
Zhou Zhuang, Xiaoyu Ji, Taimin Zhuang, Juchuan Zhang, Wenyuan Xu, Zhenhua Li, Yunhao Liu et al. FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting. ACM Asia Conference on Computer and Communications Security, 2018.
Yushi Cheng, Xiaoyu Ji, Tianyang Lu, Wenyuan Xu. DeWiCam: Detecting Hidden Wireless Cameras via Smartphones. ACM Asia Conference on Computer and Communications Security, 2018.
Chen Yan, Kevin Fu, and Wenyuan Xu. On Cuba, Diplomats, Ultrasound, and Intermodulation Distortion. Technical report, March 2018. PDF
Yushi Cheng, Xiaoyu Ji, Xinyan Zhou, Wenyuan Xu. HomeSpy: Inferring User Presence via Encrypted Traffic of Home Surveillance Camera. The 1st International Workshop on Wireless Sensing Technology (WST 2017). PDF
Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu. DolphinAttack: Inaudible Voice Commands. In Proceedings of the ACM Conference on Computer and Communications Security, 2017.PDF
Xinyan Zhou, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu. SADO: State-Associated and Delay-Oriented Data Collection for Intertidal WSNs, 9th WCSP, 2017.
Zhuoran Ma, Xinyan Zhou, Xuan Ouyang, Xiaoyu Ji, Wenyuan Xu. A Robust Backup Routing Protocol for Neighbor Area Network in the Smart Grid, 9th WCSP, 2017.
Yujun Xiao, Wenyuan Xu, Zhenhua Jia, Zhuoran Ma, Donglian Qi. NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers. Frontiers of Information Technology & Electronic Engineering, 2017, 18(4): 519-534.PDF
Chen Yan, Wenyuan Xu, Jianhao Liu, "Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicles." DEF CON 24, 2016. PDF
Yanjing Wu, Zhuoran Ma, Wenyuan Xu. Research of anti-eavesdropping technology based on electromagnetic interference against analog sensors. Electronic Technology, 2016.PDF
Yinan Wang, Zhiyun Lin, Xiao Liang, Wenyuan Xu, Qiang Yang, Gangfeng Yan. On Modeling of Electrical Cyber Physical Systems Considering Cyber Security. Frontiers of Information Technology & Electronic Engineering, 2016, 17(5): 465-478.PDF
Yinan Wang, Zhiyun Lin, Sicheng Zeng, Wenyuan Xu, Qiang Yang, Gangfeng Yan. A New Framework of Electrical Cyber Physical Systems. IEEE Conference on Industrial Electronics and Applications(ICIEA), 2016.PDF
Ting Zhao, Qiang Yang, Wenyuan Xu, Zhiyun Lin. Assessing Electric Cyber-Physical System using Integrated Co-simulation Platform. Chinese Control Conference(CCC), 2016.PDF
Ting Zhao, Yun Xu, Yinan Wang, Zhiyun Lin, Wenyuan Xu and Qiang Yang. On identifying vulnerable nodes for power system in the presence of undetectable cyber attacks. IEEE Conference on Industrial Electronics and Applications(ICIEA), 2016.PDF
Denis Foo Kune, John Backes, Shane Clark, Dan Kramer, Matthew Reynolds, Kevin Fu, Yongdae Kim, and Wenyuan Xu. Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors. In Proceedings of the IEEE Symposium on Security & Privacy, 2013.PDF
Miao Xu, Wenyuan Xu. Taco: Temperature-aware compensation for time synchronization in wireless sensor networks. Mobile Ad-Hoc and Sensor Systems (MASS), 2013.PDF
Ishtiaq Roufa, Rob Miller, et al. "Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study." 19th USENIX Security Symposium, Washington DC. 2010.PDF