If you are interested in our research, you can also find the following links with more detailed information!
- Wenyuan Xu: Personal Page
- Xiaoyu Ji: Personal Page
- Yanjiao Chen: Personal Page
- Kaikai Pan: Personal Page
- Chen Yan: Personal Page
- Yushi Cheng: Personal Page
Zizhi Jin, Qinhong Jiang, Xuancun Lu, Xiaoyu Ji, Wenyuan Xu. "PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR", accepted by Network and Distributed System Security (NDSS) Symposium 2025. PDF
Xiaoyu Ji, Wenjun Zhu, Shilin Xiao, Wenyuan Xu. "Sensor-based IoT data privacy protection", accepted by Nature Reviews Electrical Engineering 2024. PDF
Xinfeng Li, Kai Li, Yifan Zheng, Chen Yan, Xiaoyu Ji, Wenyuan Xu. SafeEar: Content Privacy-Preserving Audio Deepfake Detection, accepted by ACM Conference on Computer and Communications Security (CCS) 2024. PDF
Jialin Wu, Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Jiayang Xu, Xinfeng Li, Wenyuan Xu. "Legilimens: Practical and Unified Content Moderation for Large Language Model Services", accepted by ACM Conference on Computer and Communications Security (CCS) 2024. PDF
Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu. "CamPro: Camera-based Anti-Facial Recognition", accepted by Network and Distributed System Security (NDSS) Symposium 2024. PDF
Zhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji, Wenyuan Xu. "Uniid: Spoofing face authentication system by universal identity", accepted by Network and Distributed System Security (NDSS) Symposium 2024. PDF
Qinhong Jiang, Yanze Ren, Yan Long, Chen Yan, Yumai Sun, Xiaoyu Ji, Kevin Fu, Wenyuan Xu. "Ghosttype: The limits of using contactless electromagnetic interference to inject phantom keys into analog circuits of keyboards", accepted by Network and Distributed System Security (NDSS) Symposium 2024. PDF
Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu. "Understanding and Benchmarking the Commonality of Adversarial Examples", accepted by IEEE Symposium on Security and Privacy (SP) 2024. PDF
Xinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan, Yanjiao Chen, Xiaoyu Ji, Wenyuan Xu. "SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models", accepted by ACM Conference on Computer and Communications Security (CCS) 2024. PDF
Zizhi Jin, Xuancun Lu, Bo Yang, Yushi Cheng, Chen Yan, Xiaoyu Ji, Wenyuan Xu. "Unity is Strength? Benchmarking the Robustness of Fusion-b", accepted by ACM the Web Conference (WWW) 2024. PDF
Shilin Xiao, Xiaoyu Ji, Chen Yan, Zhicong Zheng, Wenyuan Xu. "MicPro: Microphone-based Voice Privacy Protection", accepted by ACM Conference on Computer and Communications Security (CCS) 2023. PDF
Yijie Bai, Yanjiao Chen, Hanlei Zhang, Wenyuan Xu, Haiqin Weng, Dou Goodman. “VILLAIN: Backdoor Attacks Against Vertical Split Learning”, USENIX Security Symposium (USENIX Security) 2023.PDF
Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu,"TPatch: A Triggered Physical Adversarial Patch", accepted by USENIX Security Symposium (USENIX Security), 2023.PDF
Xinfeng Li, Xiaoyu Ji, Chen Yan, Chaohao Li, Yichen Li, Zhengning Zhang, Wenyuan Xu,"Learning Normality is Enough: A Software-based Mitigation against the Inaudible Voice Attacks", accepted by USENIX Security Symposium (USENIX Security), 2023.PDF
Shibo Zhang, Yushi Cheng, Wenjun Zhu, Xiaoyu Ji, Wenyuan Xu. "CAPatch: Physical Adversarial Patch against Image Captioning Systems", accepted by USENIX Security Symposium (USENIX Security), 2023.PDF
Qinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou, Wenyuan Xu,"GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI", accepted by USENIX Security Symposium (USENIX Security), 2023.PDF
Jiangyi Deng, Fei Teng, Yanjiao Chen, Xiaofu Chen, Zhaohui Wang, Wenyuan Xu. “V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization”, USENIX Security Symposium (USENIX Security) 2023.PDF
Jiangyi Deng, Yanjiao Chen*, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu. “Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion,” USENIX Security Symposium (USENIX Security) 2023.PDF
Kai Wang, Shilin Xiao, Xiaoyu Ji, Chen Yan, Chaohao Li, Wenyuan Xu. "Volttack: Control IoT Devices by Manipulating Power Supply Voltage", accepted by IEEE Symposium on Security and Privacy (Oakland), 2023.PDF
Zhihao Wu, Yushi Cheng, Jiahui Yang, Xiaoyu Ji, Wenyuan Xu, "DepthFake: Spoofing 3D Face Authentication with a 2D Photo", accepted by IEEE Security & Privacy (Oakland), 2023.PDF
Zizhi Jin, Xiaoyu Ji, Yushi Cheng, Bo Yang, Chen Yan, Wenyuan Xu, "PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle", accepted by IEEE Security & Privacy (Oakland), 2023.PDF
Ruochen Zhou, Xiaoyu Ji*, Chen Yan, Yi-Chao Chen, Chaohao Li, Wenyuan Xu, "DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation", accepted by IEEE Security & Privacy (Oakland), 2023.PDF
Xiaoyu Ji, Juchuan Zhang, Shan Zou, Yi-Chao Chen, Gang Qu, Wenyuan Xu, "MagView++: Data Exfiltration via CPU Magnetic Signals Under Video Decoding", accepted by IEEE Transactions on Mobile Computing (TMC), 2023PDF
Yanjiao Chen, Yushi Cheng, Xiaoyu Ji, Boyang Zhou, Wenyuan Xu, Fei Teng. "PDGes: An Interpretable Detection Model for Parkinson’s Disease Using Smartphones", accepted by ACM Transactions on Sensor Networks (ToSN), 2023.PDF
Xinfeng Li, Zhicong Zheng, Chen Yan, Chaohao Li, Xiaoyu Ji, Wenyuan Xu. "Towards Pitch-Insensitive Speaker Verification via Soundfield", accepted by Internet of Things Journal (IoT-J), 2023.PDF
Zhiyun Wang, Kaikai Pan, Wenyuan Xu, "Critical cyber parameters in hybrid power systems with VSP-based virtual inertia emulation: Theoretical approach and mitigation strategy", accepted by International Journal of Electrical Power & Energy Systems, 2023.PDF
Boyang Zhou, Chen Zhang, Zhiqiang He, Zeyuan Liu, Yanjiao Chen, Wenyuan Xu, Baochun Li. “OBLIVION: Poisoning Federated Learning by Inducing Catastrophic Forgetting,” IEEE International Conference on Computer Communications (INFOCOM) 2023.PDF
Jiangyi Deng, Yanjiao Chen*, Wenyuan Xu. “FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems,” ACM Conference on Computer and Communications Security (CCS), 2022.PDF
Yan Jiang, Xiaoyu Ji*, Kai Wang, Chen Yan, Richard Mitev (Technische University of Darmstadt), Ahmad-Reza Sadeghi, Wenyuan Xu*, "WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens", in IEEE Security & Privacy (Oakland)PDF
Ruiwen He, Xiaoyu Ji*, Xinfeng Li, Yushi Cheng, Wenyuan Xu, "OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score", accepted by the 31stt USENIX Security Symposium (USENIX Security), 2022.PDF
Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji*, Ahmad-Reza Sadeghi, and Wenyuan Xu, "GhostTouch: Targeted Attacks on Touchscreens without Physical Touch", accepted by the 31stt USENIX Security Symposium (USENIX Security), 2022.PDF
Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji*, and Wenyuan Xu, "Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition", accepted by the 31stt USENIX Security Symposium (USENIX Security)PDF
Yanjiao Chen, Yijie Bai, Richard Mitev, Kaibo Wang, Ahmad-Reza Sadeghi, Wenyuan Xu. “FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants,” ACM Conference on Computer and Communications Security (CCS), 2021.PDF
Yushi Cheng, Xiaoyu Ji*, Lixu Wang, Qi Pang, Yi-Chao Chen, Wenyuan Xu, "mID: Tracing Screen Photos via Moiré Patterns", in the 30th USENIX Security Symposium (USENIX Security) 2021. PDF
Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, Kevin Fu, "Poltergeist: Acoustic Manipulation of Image Stabilization towards Object Mis-Labeling", in IEEE Security & Privacy (Oakland) 2021 (acceptance ratio: 12.1%). PDF
Guoming Zhang, Xiaoyu Ji*, Xinfeng Li, Gang Qu, Wenyuan Xu, "EarArray: Defending against Dolphinattacks via Acoustic Attenuation", in the Network and Distributed System Security Symposium (NDSS) 2021. PDF PDF
Xiaoyu Ji, Juchuan Zhang, Shui Jiang, Jishen Li, Wenyuan Xu, "CapSpeaker: Injecting Sounds to Microphones via Capacitors", in ACM CCS 2021 (CCS). PDF
Xiaoyu Ji, Yushi Cheng, Wenyuan Xu, Yuehan Chi, Hao Pan, Zhuangdi Zhu, Chuang-Wen You, Yi-Chao Chen, Lili Qiu, "No Seeing is Also Believing: Electromagnetic-emission-based Application Guessing Attacks via Smartphones", in IEEE Transactions on Mobile Computing (TMC). PDF
Juchuan Zhang, Xiaoyu Ji, Yuehan Chi, Yi-chao Chen, Bin Wang, Wenyuan Xu, "OutletSpy: cross-outlet application inference via power factor correction signal", in ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2021. PDF
Weizhao Jin, Xiaoyu Ji*, Ruiwen He, Zhou Zhuang, Wenyuan Xu, Yuan Tian, "SMS Goes Nuclear: Fortifying SMS-Based MFA in Online Account Ecosystem", on Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W) 2021. PDF
Chaohao Li, Xiaoyu Ji*, Bin Wang, Kai Wang, Wenyuan Xu, "SenCS: Enabling Real-time Indoor Proximity Verification via Contextual Similarity Authors", in ACM Transactions on Sensor Networks (ToSN). PDF
J Zhang, X Ji, W Xu, YC Chen, Y Tang, G Qu. "MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding ", in IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 357-366.
C Yan, H Shin, C Bolton, W Xu, Y Kim, K Fu. "SoK: A Minimalist Approach to Formalizing Analog Sensor Security", in 2020 IEEE Symposium on Security and Privacy (SP), 480-495
X Ji, C Li, X Zhou, J Zhang, Y Zhang, W Xu. "Authenticating Smart Home Devices via Home Limited Channels", in ACM Transactions on Internet of Things 1 (4), 1-24
Y Cheng, X Ji, X Li, T Zhang, S Malebary, X Qu, W Xu. "Identifying child users via touchscreen interactions ", in ACM Transactions on Sensor Networks (TOSN) 16 (4), 1-25
X Ji, X Zhou, M Xu, W Xu, Y Dong. "OPCIO: Optimizing Power Consumption for Embedded Devices via GPIO Configuration ", in ACM Transactions on Sensor Networks (TOSN) 16 (2), 1-28
Yushi Cheng, Xiaoyu Ji, Juchuan Zhang, Wenyuan Xu, Yi-Chao Chen. DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security.(CCS2019) PDF
Xinyan Zhou, Xiaoyu Ji, Chen Yan, Jiangyi Deng, Wenyuan Xu. NAuth: Secure Face-to-Face Device Authentication via Nonlinearity. IEEE INFOCOM 2019.
Chen Yan, Yan Long, Xiaoyu Ji, Wenyuan Xu. “The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification”, to appear at ACM Conference on Computer and Communications Security (CCS) 2019.
Chen Yan, Kevin Fu, Wenyuan Xu. “On Cuba, Diplomats, Ultrasound, and Intermodulation Distortion.” Computers in Biology and Medicine 104 (2019): 250-266.
Chen Yan, Guoming Zhang, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu. “The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants”, to appear on IEEE Transactions on Dependable and Secure Computing (TDSC).
Chaohao Li, Xiaoyu Ji, Xinyan Zhou, Juchuan Zhang, Jing Tian, Yanmiao Zhang, Wenyuan Xu. HlcAuth: Key-free and Secure Communications via Home-Limited Channel. ACM Asia Conference on Computer and Communications Security, 2018.
Zhou Zhuang, Xiaoyu Ji, Taimin Zhuang, Juchuan Zhang, Wenyuan Xu, Zhenhua Li, Yunhao Liu et al. FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting. ACM Asia Conference on Computer and Communications Security, 2018.
Yushi Cheng, Xiaoyu Ji, Tianyang Lu, Wenyuan Xu. DeWiCam: Detecting Hidden Wireless Cameras via Smartphones. ACM Asia Conference on Computer and Communications Security, 2018.
Chen Yan, Kevin Fu, and Wenyuan Xu. On Cuba, Diplomats, Ultrasound, and Intermodulation Distortion. Technical report, March 2018. PDF
Yushi Cheng, Xiaoyu Ji, Xinyan Zhou, Wenyuan Xu. HomeSpy: Inferring User Presence via Encrypted Traffic of Home Surveillance Camera. The 1st International Workshop on Wireless Sensing Technology (WST 2017). PDF
Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu. DolphinAttack: Inaudible Voice Commands. In Proceedings of the ACM Conference on Computer and Communications Security, 2017.PDF
Xinyan Zhou, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu. SADO: State-Associated and Delay-Oriented Data Collection for Intertidal WSNs, 9th WCSP, 2017.
Zhuoran Ma, Xinyan Zhou, Xuan Ouyang, Xiaoyu Ji, Wenyuan Xu. A Robust Backup Routing Protocol for Neighbor Area Network in the Smart Grid, 9th WCSP, 2017.
Yujun Xiao, Wenyuan Xu, Zhenhua Jia, Zhuoran Ma, Donglian Qi. NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers. Frontiers of Information Technology & Electronic Engineering, 2017, 18(4): 519-534.PDF
Chen Yan, Wenyuan Xu, Jianhao Liu, "Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicles." DEF CON 24, 2016. PDF
Yanjing Wu, Zhuoran Ma, Wenyuan Xu. Research of anti-eavesdropping technology based on electromagnetic interference against analog sensors. Electronic Technology, 2016.PDF
Yinan Wang, Zhiyun Lin, Xiao Liang, Wenyuan Xu, Qiang Yang, Gangfeng Yan. On Modeling of Electrical Cyber Physical Systems Considering Cyber Security. Frontiers of Information Technology & Electronic Engineering, 2016, 17(5): 465-478.PDF
Yinan Wang, Zhiyun Lin, Sicheng Zeng, Wenyuan Xu, Qiang Yang, Gangfeng Yan. A New Framework of Electrical Cyber Physical Systems. IEEE Conference on Industrial Electronics and Applications(ICIEA), 2016.PDF
Ting Zhao, Qiang Yang, Wenyuan Xu, Zhiyun Lin. Assessing Electric Cyber-Physical System using Integrated Co-simulation Platform. Chinese Control Conference(CCC), 2016.PDF
Ting Zhao, Yun Xu, Yinan Wang, Zhiyun Lin, Wenyuan Xu and Qiang Yang. On identifying vulnerable nodes for power system in the presence of undetectable cyber attacks. IEEE Conference on Industrial Electronics and Applications(ICIEA), 2016.PDF
Denis Foo Kune, John Backes, Shane Clark, Dan Kramer, Matthew Reynolds, Kevin Fu, Yongdae Kim, and Wenyuan Xu. Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors. In Proceedings of the IEEE Symposium on Security & Privacy, 2013.PDF
Miao Xu, Wenyuan Xu. Taco: Temperature-aware compensation for time synchronization in wireless sensor networks. Mobile Ad-Hoc and Sensor Systems (MASS), 2013.PDF
Ishtiaq Roufa, Rob Miller, et al. "Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study." 19th USENIX Security Symposium, Washington DC. 2010.PDF