A survey on voice assistant security: Attacks and countermeasures C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu ACM Computing Surveys 55 (4), 1-36, 2022 | 67 | 2022 |
{GlitchHiker}: Uncovering vulnerabilities of image signal transmission with {IEMI} Q Jiang, X Ji, C Yan, Z Xie, H Lou, W Xu 32nd USENIX Security Symposium (USENIX Security 23), 7249-7266, 2023 | 28 | 2023 |
EM Eye: Characterizing electromagnetic side-channel eavesdropping on embedded cameras Y Long, Q Jiang, C Yan, T Alam, X Ji, W Xu, K Fu Internet Society, 2024 | 14 | 2024 |
Ghosttype: The limits of using contactless electromagnetic interference to inject phantom keys into analog circuits of keyboards Q Jiang, Y Ren, Y Long, C Yan, Y Sun, X Ji, K Fu, W Xu Network and Distributed Systems Security (NDSS) Symposium, 2024 | 4 | 2024 |
Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection Y Zhang, C Yang, EY Fu, Q Jiang, C Yan, SY Chau, G Ngai, HV Leong, ... 2024 IEEE International Conference on Multimedia and Expo (ICME), 1-6, 2024 | 3 | 2024 |
Intentional Electromagnetic Interference Attack against Infrared Thermal Imaging Sensor H Zhang, Q Jiang, Y Cheng, X Ji, W Xu 2022 IEEE 6th Conference on Energy Internet and Energy System Integration …, 2022 | 2 | 2022 |
PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR Z Jin, Q Jiang, X Lu, C Yan, X Ji, W Xu arXiv preprint arXiv:2409.17907, 2024 | | 2024 |
Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification X Ji, Q Jiang, C Li, Z Shi, W Xu IEEE Transactions on Information Forensics and Security 19, 3366-3379, 2024 | | 2024 |