When good becomes evil: Keystroke inference with smartwatch X Liu, Z Zhou, W Diao, Z Li, K Zhang Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 255 | 2015 |
Your voice assistant is mine: How to abuse speakers to steal information and control your phone W Diao, X Liu, Z Zhou, K Zhang Proceedings of the 4th ACM workshop on security and privacy in smartphones …, 2014 | 220 | 2014 |
Understanding android obfuscation techniques: A large-scale investigation in the wild S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang Security and privacy in communication networks: 14th international …, 2018 | 181 | 2018 |
Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound Z Zhou, W Diao, X Liu, K Zhang Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 135 | 2014 |
Invisible mask: Practical attacks on face recognition with infrared Z Zhou, D Tang, X Wang, W Han, X Liu, K Zhang arXiv preprint arXiv:1803.04683, 2018 | 104 | 2018 |
No pardon for the interruption: New inference attacks on android through interrupt timing analysis W Diao, X Liu, Z Li, K Zhang 2016 ieee symposium on security and privacy (sp), 414-432, 2016 | 78 | 2016 |
SemAttack: Natural textual attacks via different semantic spaces B Wang, C Xu, X Liu, Y Cheng, B Li arXiv preprint arXiv:2205.01287, 2022 | 55 | 2022 |
Vulnerable gpu memory management: towards recovering raw data from gpu Z Zhou, W Diao, X Liu, Z Li, K Zhang, R Liu arXiv preprint arXiv:1605.06610, 2016 | 43 | 2016 |
Evading android runtime analysis through detecting programmed interactions W Diao, X Liu, Z Li, K Zhang Proceedings of the 9th ACM conference on security & privacy in wireless and …, 2016 | 39 | 2016 |
Kindness is a risky business: On the usage of the accessibility {APIs} in android W Diao, Y Zhang, L Zhang, Z Li, F Xu, X Pan, X Liu, J Weng, K Zhang, ... 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 27 | 2019 |
An empirical study on android for saving non-shared data on public storage X Liu, Z Zhou, W Diao, Z Li, K Zhang ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015 | 27* | 2015 |
Incorporating external POS tagger for punctuation restoration N Shi, W Wang, B Wang, J Li, X Liu, Z Lin arXiv preprint arXiv:2106.06731, 2021 | 12 | 2021 |
FairRec: Fairness testing for deep recommender systems H Guo, J Li, J Wang, X Liu, D Wang, Z Hu, R Zhang, H Xue Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 10 | 2023 |
Bad apples: Understanding the centralized security risks in decentralized ecosystems K Yan, J Zhang, X Liu, W Diao, S Guo Proceedings of the ACM Web Conference 2023, 2274-2283, 2023 | 10 | 2023 |
Revisit systematic generalization via meaningful learning N Shi, B Wang, W Wang, X Liu, Z Lin arXiv preprint arXiv:2003.06658, 2020 | 9* | 2020 |
Instrumental variable-driven domain generalization with unobserved confounders J Yuan, X Ma, R Xiong, M Gong, X Liu, F Wu, L Lin, K Kuang ACM Transactions on Knowledge Discovery from Data 17 (8), 1-21, 2023 | 8 | 2023 |
ShadowDroid: practical black-box attack against ML-based android malware detection J Zhang, C Zhang, X Liu, Y Wang, W Diao, S Guo 2021 IEEE 27th International Conference on Parallel and Distributed Systems …, 2021 | 8 | 2021 |
Mind-reading: Privacy attacks exploiting cross-app KeyEvent injections W Diao, X Liu, Z Zhou, K Zhang, Z Li Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 8 | 2015 |
Enhancing model robustness by incorporating adversarial knowledge into semantic representation J Li, T Du, X Liu, R Zhang, H Xue, S Ji ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021 | 5 | 2021 |
Rochbert: Towards robust BERT fine-tuning for chinese Z Zhang, J Li, N Shi, B Yuan, X Liu, R Zhang, H Xue, D Sun, C Zhang arXiv preprint arXiv:2210.15944, 2022 | 4 | 2022 |