Selected Publications

If you are interested in our research, you can also find the following links with more detailed information!
- Wenyuan Xu: Personal Page
- Xiaoyu Ji: Personal Page
- Yanjiao Chen: Personal Page
- Kaikai Pan: Personal Page
- Chen Yan: Personal Page
- Yushi Cheng: Personal Page

2023

Shilin Xiao, Xiaoyu Ji, Chen Yan, Zhicong Zheng, Wenyuan Xu. "MicPro: Microphone-based Voice Privacy Protection", accepted by ACM Conference on Computer and Communications Security (CCS) 2023. PDF

Yijie Bai, Yanjiao Chen, Hanlei Zhang, Wenyuan Xu, Haiqin Weng, Dou Goodman. “VILLAIN: Backdoor Attacks Against Vertical Split Learning”, USENIX Security Symposium (USENIX Security) 2023.PDF

Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu,"TPatch: A Triggered Physical Adversarial Patch", accepted by USENIX Security Symposium (USENIX Security), 2023.PDF

Xinfeng Li, Xiaoyu Ji, Chen Yan, Chaohao Li, Yichen Li, Zhengning Zhang, Wenyuan Xu,"Learning Normality is Enough: A Software-based Mitigation against the Inaudible Voice Attacks", accepted by USENIX Security Symposium (USENIX Security), 2023.PDF

Shibo Zhang, Yushi Cheng, Wenjun Zhu, Xiaoyu Ji, Wenyuan Xu. "CAPatch: Physical Adversarial Patch against Image Captioning Systems", accepted by USENIX Security Symposium (USENIX Security), 2023.PDF

Qinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou, Wenyuan Xu,"GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI", accepted by USENIX Security Symposium (USENIX Security), 2023.PDF

Jiangyi Deng, Fei Teng, Yanjiao Chen, Xiaofu Chen, Zhaohui Wang, Wenyuan Xu. “V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization”, USENIX Security Symposium (USENIX Security) 2023.PDF

Jiangyi Deng, Yanjiao Chen*, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu. “Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion,” USENIX Security Symposium (USENIX Security) 2023.PDF

Kai Wang, Shilin Xiao, Xiaoyu Ji, Chen Yan, Chaohao Li, Wenyuan Xu. "Volttack: Control IoT Devices by Manipulating Power Supply Voltage", accepted by IEEE Symposium on Security and Privacy (Oakland), 2023.PDF

Zhihao Wu, Yushi Cheng, Jiahui Yang, Xiaoyu Ji, Wenyuan Xu, "DepthFake: Spoofing 3D Face Authentication with a 2D Photo", accepted by IEEE Security & Privacy (Oakland), 2023.PDF

Zizhi Jin, Xiaoyu Ji, Yushi Cheng, Bo Yang, Chen Yan, Wenyuan Xu, "PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle", accepted by IEEE Security & Privacy (Oakland), 2023.PDF

Ruochen Zhou, Xiaoyu Ji*, Chen Yan, Yi-Chao Chen, Chaohao Li, Wenyuan Xu, "DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation", accepted by IEEE Security & Privacy (Oakland), 2023.PDF

Xiaoyu Ji, Juchuan Zhang, Shan Zou, Yi-Chao Chen, Gang Qu, Wenyuan Xu, "MagView++: Data Exfiltration via CPU Magnetic Signals Under Video Decoding", accepted by IEEE Transactions on Mobile Computing (TMC), 2023PDF

Yanjiao Chen, Yushi Cheng, Xiaoyu Ji, Boyang Zhou, Wenyuan Xu, Fei Teng. "PDGes: An Interpretable Detection Model for Parkinson’s Disease Using Smartphones", accepted by ACM Transactions on Sensor Networks (ToSN), 2023.PDF

Xinfeng Li, Zhicong Zheng, Chen Yan, Chaohao Li, Xiaoyu Ji, Wenyuan Xu. "Towards Pitch-Insensitive Speaker Verification via Soundfield", accepted by Internet of Things Journal (IoT-J), 2023.PDF

Zhiyun Wang, Kaikai Pan, Wenyuan Xu, "Critical cyber parameters in hybrid power systems with VSP-based virtual inertia emulation: Theoretical approach and mitigation strategy", accepted by International Journal of Electrical Power & Energy Systems, 2023.PDF

Boyang Zhou, Chen Zhang, Zhiqiang He, Zeyuan Liu, Yanjiao Chen, Wenyuan Xu, Baochun Li. “OBLIVION: Poisoning Federated Learning by Inducing Catastrophic Forgetting,” IEEE International Conference on Computer Communications (INFOCOM) 2023.PDF

2022

Jiangyi Deng, Yanjiao Chen*, Wenyuan Xu. “FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems,” ACM Conference on Computer and Communications Security (CCS), 2022.PDF

Yan Jiang, Xiaoyu Ji*, Kai Wang, Chen Yan, Richard Mitev (Technische University of Darmstadt), Ahmad-Reza Sadeghi, Wenyuan Xu*, "WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens", in IEEE Security & Privacy (Oakland)PDF

Ruiwen He, Xiaoyu Ji*, Xinfeng Li, Yushi Cheng, Wenyuan Xu, "OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score", accepted by the 31stt USENIX Security Symposium (USENIX Security), 2022.PDF

Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji*, Ahmad-Reza Sadeghi, and Wenyuan Xu, "GhostTouch: Targeted Attacks on Touchscreens without Physical Touch", accepted by the 31stt USENIX Security Symposium (USENIX Security), 2022.PDF

Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji*, and Wenyuan Xu, "Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition", accepted by the 31stt USENIX Security Symposium (USENIX Security)PDF

2021

Yanjiao Chen, Yijie Bai, Richard Mitev, Kaibo Wang, Ahmad-Reza Sadeghi, Wenyuan Xu. “FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants,” ACM Conference on Computer and Communications Security (CCS), 2021.PDF

Yushi Cheng, Xiaoyu Ji*, Lixu Wang, Qi Pang, Yi-Chao Chen, Wenyuan Xu, "mID: Tracing Screen Photos via Moiré Patterns", in the 30th USENIX Security Symposium (USENIX Security) 2021.  PDF

Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, Kevin Fu, "Poltergeist: Acoustic Manipulation of Image Stabilization towards Object Mis-Labeling", in IEEE Security & Privacy (Oakland) 2021 (acceptance ratio: 12.1%).  PDF

Guoming Zhang, Xiaoyu Ji*, Xinfeng Li, Gang Qu, Wenyuan Xu, "EarArray: Defending against Dolphinattacks via Acoustic Attenuation", in the Network and Distributed System Security Symposium (NDSS) 2021. PDF  PDF

Xiaoyu Ji, Juchuan Zhang, Shui Jiang, Jishen Li, Wenyuan Xu, "CapSpeaker: Injecting Sounds to Microphones via Capacitors", in ACM CCS 2021 (CCS).  PDF

Xiaoyu Ji, Yushi Cheng, Wenyuan Xu, Yuehan Chi, Hao Pan, Zhuangdi Zhu, Chuang-Wen You, Yi-Chao Chen, Lili Qiu, "No Seeing is Also Believing: Electromagnetic-emission-based Application Guessing Attacks via Smartphones", in IEEE Transactions on Mobile Computing (TMC).   PDF

Juchuan Zhang, Xiaoyu Ji, Yuehan Chi, Yi-chao Chen, Bin Wang, Wenyuan Xu, "OutletSpy: cross-outlet application inference via power factor correction signal", in ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2021. PDF

Weizhao Jin, Xiaoyu Ji*, Ruiwen He, Zhou Zhuang, Wenyuan Xu, Yuan Tian, "SMS Goes Nuclear: Fortifying SMS-Based MFA in Online Account Ecosystem", on Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W) 2021.  PDF

Chaohao Li, Xiaoyu Ji*, Bin Wang, Kai Wang, Wenyuan Xu, "SenCS: Enabling Real-time Indoor Proximity Verification via Contextual Similarity Authors", in ACM Transactions on Sensor Networks (ToSN).  PDF

2020

J Zhang, X Ji, W Xu, YC Chen, Y Tang, G Qu. "MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding ", in IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 357-366.   

C Yan, H Shin, C Bolton, W Xu, Y Kim, K Fu. "SoK: A Minimalist Approach to Formalizing Analog Sensor Security", in 2020 IEEE Symposium on Security and Privacy (SP), 480-495   

X Ji, C Li, X Zhou, J Zhang, Y Zhang, W Xu. "Authenticating Smart Home Devices via Home Limited Channels", in ACM Transactions on Internet of Things 1 (4), 1-24   

Y Cheng, X Ji, X Li, T Zhang, S Malebary, X Qu, W Xu. "Identifying child users via touchscreen interactions ", in ACM Transactions on Sensor Networks (TOSN) 16 (4), 1-25   

X Ji, X Zhou, M Xu, W Xu, Y Dong. "OPCIO: Optimizing Power Consumption for Embedded Devices via GPIO Configuration ", in ACM Transactions on Sensor Networks (TOSN) 16 (2), 1-28   

2019

Yushi Cheng, Xiaoyu Ji, Juchuan Zhang, Wenyuan Xu, Yi-Chao Chen. DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security.(CCS2019)  PDF

Xinyan Zhou, Xiaoyu Ji, Chen Yan, Jiangyi Deng, Wenyuan Xu. NAuth: Secure Face-to-Face Device Authentication via Nonlinearity. IEEE INFOCOM 2019.  

Chen Yan, Yan Long, Xiaoyu Ji, Wenyuan Xu. “The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification”, to appear at ACM Conference on Computer and Communications Security (CCS) 2019.  

Chen Yan, Kevin Fu, Wenyuan Xu. “On Cuba, Diplomats, Ultrasound, and Intermodulation Distortion.” Computers in Biology and Medicine 104 (2019): 250-266.  

Chen Yan, Guoming Zhang, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu. “The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants”, to appear on IEEE Transactions on Dependable and Secure Computing (TDSC).  

2018

Chaohao Li, Xiaoyu Ji, Xinyan Zhou, Juchuan Zhang, Jing Tian, Yanmiao Zhang, Wenyuan Xu. HlcAuth: Key-free and Secure Communications via Home-Limited Channel. ACM Asia Conference on Computer and Communications Security, 2018.   

Zhou Zhuang, Xiaoyu Ji, Taimin Zhuang, Juchuan Zhang, Wenyuan Xu, Zhenhua Li, Yunhao Liu et al. FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting. ACM Asia Conference on Computer and Communications Security, 2018.   

Yushi Cheng, Xiaoyu Ji, Tianyang Lu, Wenyuan Xu. DeWiCam: Detecting Hidden Wireless Cameras via Smartphones. ACM Asia Conference on Computer and Communications Security, 2018.   

Chen Yan, Kevin Fu, and Wenyuan Xu. On Cuba, Diplomats, Ultrasound, and Intermodulation Distortion. Technical report, March 2018.  PDF

2017

Yushi Cheng, Xiaoyu Ji, Xinyan Zhou, Wenyuan Xu. HomeSpy: Inferring User Presence via Encrypted Traffic of Home Surveillance Camera. The 1st International Workshop on Wireless Sensing Technology (WST 2017).  PDF

Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu. DolphinAttack: Inaudible Voice Commands. In Proceedings of the ACM Conference on Computer and Communications Security, 2017.Bibtex  PDF

@inproceedings{zhang2017dolphinattack, title={DolphinAttack: Inaudible voice commands}, author={Zhang, Guoming and Yan, Chen and Ji, Xiaoyu and Zhang, Tianchen and Zhang, Taimin and Xu, Wenyuan}, booktitle={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}, pages={103--117}, year={2017}, organization={ACM} }

Xinyan Zhou, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu. SADO: State-Associated and Delay-Oriented Data Collection for Intertidal WSNs, 9th WCSP, 2017.Bibtex  

Zhuoran Ma, Xinyan Zhou, Xuan Ouyang, Xiaoyu Ji, Wenyuan Xu. A Robust Backup Routing Protocol for Neighbor Area Network in the Smart Grid, 9th WCSP, 2017.Bibtex  

Yujun Xiao, Wenyuan Xu, Zhenhua Jia, Zhuoran Ma, Donglian Qi. NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers. Frontiers of Information Technology & Electronic Engineering, 2017, 18(4): 519-534.Bibtex  PDF

@article{Xiao2017NIPAD, title={NIPAD:a non-invasive power-based anomaly detection scheme for programmable logic controllers}, author={Xiao, Yu Jun and Wen-Yuan, X. U. and Jia, Zhen Hua and Zhuo-Ran, M. A. and Dong-Lian, Q. I.}, journal={信息与电子工程前沿 (英文)}, volume={18}, number={4}, pages={519-534}, year={2017}, }

2016

Chen Yan, Wenyuan Xu, Jianhao Liu, "Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicles." DEF CON 24, 2016. Bibtex  PDF

@article{yan2016can, title={Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle}, author={Yan, Chen and Wenyuan, X and Liu, Jianhao}, journal={DEF CON}, year={2016} }

Yanjing Wu, Zhuoran Ma, Wenyuan Xu. Research of anti-eavesdropping technology based on electromagnetic interference against analog sensors. Electronic Technology, 2016.Bibtex  PDF

@article{Wu2016Research, title={Research of anti-eavesdropping technology based on electromagnetic interference against analog sensors}, author={Wu, Yanjing and Ma, Zhuoran and Xu, Wenyuan}, journal={Electronic Technology}, year={2016}, }

Yinan Wang, Zhiyun Lin, Xiao Liang, Wenyuan Xu, Qiang Yang, Gangfeng Yan. On Modeling of Electrical Cyber Physical Systems Considering Cyber Security. Frontiers of Information Technology & Electronic Engineering, 2016, 17(5): 465-478.Bibtex  PDF

@article{Wang2016On, title={On modeling of electrical cyber-physical systems considering cyber security}, author={Wang, Yi Nan and Lin, Zhi Yun and Liang, Xiao and Xu, Wen Yuan and Yang, Qiang and Yan, Gang Feng}, journal={信息与电子工程前沿 (英文)}, volume={17}, number={5}, pages={465-478}, year={2016}, }

Yinan Wang, Zhiyun Lin, Sicheng Zeng, Wenyuan Xu, Qiang Yang, Gangfeng Yan. A New Framework of Electrical Cyber Physical Systems. IEEE Conference on Industrial Electronics and Applications(ICIEA), 2016.Bibtex  PDF

@inproceedings{Wang2016A, title={A new framework of electrical cyber physical systems}, author={Wang, Yinan and Zeng, Sicheng and Yang, Qiang and Lin, Zhiyun and Xu, Wenyuan and Yan, Gangfeng}, booktitle={IEEE Conference on Industrial Electronics and Applications}, pages={1334-1339}, year={2016}, }

Ting Zhao, Qiang Yang, Wenyuan Xu, Zhiyun Lin. Assessing Electric Cyber-Physical System using Integrated Co-simulation Platform. Chinese Control Conference(CCC), 2016.Bibtex  PDF

@inproceedings{Zhao2016Assessing, title={Assessing electric cyber-physical system using integrated co-simulation platform}, author={Zhao, Ting and Yang, Qiang and Xu, Wenyuan and Lin, Zhiyun}, booktitle={Control Conference}, pages={9842-9847}, year={2016}, }

Ting Zhao, Yun Xu, Yinan Wang, Zhiyun Lin, Wenyuan Xu and Qiang Yang. On identifying vulnerable nodes for power system in the presence of undetectable cyber attacks. IEEE Conference on Industrial Electronics and Applications(ICIEA), 2016.Bibtex  PDF

@inproceedings{Zhao2016On, title={On identifying vulnerable nodes for power systems in the presence of undetectable cyber-attacks}, author={Zhao, Ting and Xu, Yun and Wang, Yinan and Lin, Zhiyun and Xu, Wenyuan and Yang, Qiang}, booktitle={Industrial Electronics and Applications}, pages={1062-1067}, year={2016}, }

2013

Denis Foo Kune, John Backes, Shane Clark, Dan Kramer, Matthew Reynolds, Kevin Fu, Yongdae Kim, and Wenyuan Xu. Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors. In Proceedings of the IEEE Symposium on Security & Privacy, 2013.Bibtex  PDF

@inproceedings{Kune2013Ghost, title={Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors}, author={Kune, Denis Foo and Backes, John and Clark, Shane S. and Kramer, Daniel and Reynolds, Matthew and Fu, Kevin and Kim, Yongdae and Xu, Wenyuan}, booktitle={IEEE Symposium on Security and Privacy}, pages={145-159}, year={2013}, }

Miao Xu, Wenyuan Xu. Taco: Temperature-aware compensation for time synchronization in wireless sensor networks. Mobile Ad-Hoc and Sensor Systems (MASS), 2013.Bibtex  PDF

@inproceedings{Xu2013TACO, title={TACO: Temperature-Aware Compensation for Time Synchronization in Wireless Sensor Networks}, author={Xu, Miao and Xu, Wenyuan}, booktitle={IEEE International Conference on Mobile Ad-Hoc and Sensor Systems}, pages={122-130}, year={2013}, }

2010

Ishtiaq Roufa, Rob Miller, et al. "Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study." 19th USENIX Security Symposium, Washington DC. 2010.Bibtex  PDF

@inproceedings{Rouf2010Security, title={Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study}, author={Rouf, Ishtiaq and Miller, Rob and Mustafa, Hossen and Taylor, Travis and Oh, Sangho and Xu, Wenyuan and Gruteser, Marco and Trappe, Wade and Seskar, Ivan}, booktitle={Usenix Security Symposium, Washington, Dc, Usa, August 11-13, 2010, Proceedings}, pages={323-338}, year={2010}, }