Voicepop: A pop noise based anti-spoofing system for voice authentication on smartphones Q Wang, X Lin, M Zhou, Y Chen, C Wang, Q Li, X Luo IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2062-2070, 2019 | 131 | 2019 |
Messages behind the sound: real-time hidden acoustic signal capture with smartphones Q Wang, K Ren, M Zhou, T Lei, D Koutsonikolas, L Su Proceedings of the 22nd Annual International Conference on Mobile Computing …, 2016 | 104 | 2016 |
LVID: A multimodal biometrics authentication system on smartphones L Wu, J Yang, M Zhou, Y Chen, Q Wang IEEE Transactions on Information Forensics and Security 15, 1572-1585, 2020 | 100 | 2020 |
Patternlistener: Cracking android pattern lock using acoustic signals M Zhou, Q Wang, J Yang, Q Li, F Xiao, Z Wang, X Chen Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 93 | 2018 |
Rain bar: Robust application-driven visual communication using color barcodes Q Wang, M Zhou, K Ren, T Lei, J Li, Z Wang 2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015 | 80 | 2015 |
Hidden voice commands: Attacks and defenses on the VCS of autonomous driving cars M Zhou, Z Qin, X Lin, S Hu, Q Wang, K Ren IEEE Wireless Communications 26 (5), 128-133, 2019 | 70 | 2019 |
Dolphin: Real-time hidden acoustic signal capture with smartphones M Zhou, Q Wang, K Ren, D Koutsonikolas, L Su, Y Chen IEEE Transactions on Mobile Computing 18 (3), 560-573, 2019 | 45 | 2019 |
Stealing your android patterns via acoustic signals M Zhou, Q Wang, J Yang, Q Li, P Jiang, Y Chen, Z Wang IEEE Transactions on Mobile Computing 20 (4), 1656-1671, 2021 | 33 | 2021 |
Active link obfuscation to thwart link-flooding attacks for internet of things X Ding, F Xiao, M Zhou, Z Wang 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 28* | 2020 |
Enabling online robust barcode-based visible light communication with realtime feedback M Zhou, Q Wang, T Lei, Z Wang, K Ren IEEE Transactions on Wireless Communications 17 (12), 8063-8076, 2018 | 27 | 2018 |
Securing face liveness detection using unforgeable lip motion patterns M Zhou, Q Wang, Q Li, W Zhou, J Yang, C Shen IEEE Transactions on Mobile Computing 23 (10), 9772 - 9788, 2024 | 19 | 2024 |
Securing liveness detection for voice authentication via pop noises P Jiang, Q Wang, X Lin, M Zhou, W Ding, C Wang, C Shen, Q Li IEEE Transactions on Dependable and Secure Computing 20 (2), 1702-1718, 2023 | 18 | 2023 |
SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals D Liu, Q Wang, M Zhou, P Jiang, Q Li, C Shen, C Wang IEEE Transactions on Dependable and Secure Computing 20 (2), 1687-1701, 2023 | 14 | 2023 |
Presspin: Enabling secure pin authentication on mobile devices via structure-borne sounds M Zhou, Q Wang, X Lin, Y Zhao, P Jiang, Q Li, C Shen, C Wang IEEE Transactions on Dependable and Secure Computing 20 (2), 1228-1242, 2023 | 13 | 2023 |
Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints M Li, W Wan, J Lu, S Hu, J Shi, LY Zhang, M Zhou, Y Zheng 2022 18th International Conference on Mobility, Sensing and Networking (MSN …, 2022 | 7 | 2022 |
Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns Z Zheng, Q Wang, C Wang, M Zhou, Y Zhao, Q Li, C Shen IEEE Transactions on Information Forensics and Security 18, 1295-1308, 2023 | 6 | 2023 |
SonarGuard: Ultrasonic Face Liveness Detection on Mobile Devices D Zhang, J Meng, J Zhang, X Deng, S Ding, M Zhou, Q Wang, Q Li, ... IEEE Transactions on Circuits and Systems for Video Technology 33 (8), 4401 …, 2023 | 5 | 2023 |
Stealthy and effective physical adversarial attacks in autonomous driving M Zhou, W Zhou, J Huang, J Yang, M Du, Q Li IEEE Transactions on Information Forensics and Security, 2024 | 4 | 2024 |
FingerPattern: Securing Pattern Lock Via Fingerprint-Dependent Friction Sound M Zhou, Y Zhou, S Su, Q Wang, Q Li, S Hu, C Yu, Z Li IEEE Transactions on Mobile Computing 23 (6), 7210 - 7224, 2024 | 4 | 2024 |
Poster: Enabling secure location authentication in drone F Xiao, M Zhou, Y Liye, J Yang, Q Wang Proceedings of the 23rd Annual International Conference on Mobile Computing …, 2017 | 4 | 2017 |