EarArray: Defending against DolphinAttack via Acoustic Attenuation. G Zhang, X Ji, X Li, G Qu, W Xu Network and Distributed System Security (NDSS) Symposium 2021, 2021 | 45 | 2021 |
SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models X Li, Y Yang, J Deng, C Yan, Y Chen, X Ji, W Xu ACM CCS 2024, 2024 | 23* | 2024 |
Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks X Li, X Ji, C Yan, C Li, Y Li, Z Zhang, W Xu 32nd USENIX Security Symposium (USENIX Security 23), 2455-2472, 2023 | 16 | 2023 |
“OK, Siri” or “Hey, Google”: Evaluating Voiceprint Distinctiveness Via Content-based PROLE Score R He, X Ji, X Li, Y Cheng, W Xu 31st USENIX Security Symposium (USENIX Security 2022), 2022 | 10 | 2022 |
UltraBD: Backdoor Attack against Automatic Speaker Verification Systems via Adversarial Ultrasound J Ze, X Li, Y Cheng, X Ji, W Xu 2022 IEEE 28th International Conference on Parallel and Distributed Systems …, 2023 | 8 | 2023 |
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time X Li, C Yan, X Lu, Z Zeng, X Ji, W Xu Network and Distributed System Security (NDSS) Symposium 2024, 2024 | 7 | 2024 |
SafeEar: Content Privacy-Preserving Audio Deepfake Detection X Li, K Li, Y Zheng, C Yan, X Ji, W Xu ACM CCS 2024, 2024 | 5 | 2024 |
Enrollment-Stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound X Li, J Ze, C Yan, Y Cheng, X Ji, W Xu IEEE Internet of Things Journal, vol. 11, no. 8, pp. 13108-13124, 2023 | 5 | 2023 |
Legilimens: Practical and Unified Content Moderation for Large Language Model Services J Wu, J Deng, S Pang, Y Chen, J Xu, X Li, W Xu ACM CCS 2024, 2024 | 4 | 2024 |
The Silent Manipulator: A Practical and Inaudible Backdoor Attack against Speech Recognition Systems Z Zheng, X Li, C Yan, X Ji, W Xu Proceedings of the 31st ACM International Conference on Multimedia, 7849-7858, 2023 | 4 | 2023 |
Toward Pitch-Insensitive Speaker Verification via Soundfield X Li, Z Zheng, C Yan, C Li, X Ji, W Xu IEEE Internet of Things Journal 11 (1), 1175-1189, 2023 | 4 | 2023 |
RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer J Deng*, X Li*, Y Chen, Y Bai, H Weng, Y Liu, T Wei, W Xu Network and Distributed System Security (NDSS) Symposium 2025, 2024 | 2 | 2024 |
Detecting Inaudible Voice Commands via Acoustic Attenuation by Multi-channel Microphones X Ji, G Zhang, X Li, G Qu, X Cheng, W Xu IEEE Transactions on Dependable and Secure Computing, 2024 | 2 | 2024 |
Beyond Universal Transformer: Block Reusing with Adaptor in Transformer for Automatic Speech Recognition H Tang, Z Liu, C Zeng, X Li International Symposium on Neural Networks, 69-79, 2024 | 1 | 2024 |
VarASV: Enabling Pitch-Variable Automatic Speaker Verification via Multi-Task Learning Y Gao, X Li, C Li, W Sun, X Ji, W Xu 2021 IEEE 5th Conference on Energy Internet and Energy System Integration …, 2021 | 1 | 2021 |
PromptGuard: Soft Prompt-Guided Unsafe Content Moderation for Text-to-Image Models L Yuan, X Li, C Xu, G Tao, X Jia, Y Huang, W Dong, Y Liu, XF Wang, B Li arXiv preprint arXiv:2501.03544, 2025 | | 2025 |
Scoring Metrics of Assessing Voiceprint Distinctiveness Based on Speech Content and Rate R He, Y Cheng, J Ze, X Li, X Ji, W Xu IEEE Transactions on Dependable and Secure Computing, 2024 | | 2024 |