Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT C Shi, J Liu, H Liu, Y Chen Proceedings of the 18th ACM international symposium on mobile ad hoc …, 2017 | 329 | 2017 |
Real-time, universal, and robust adversarial attacks against speaker recognition systems Y Xie, C Shi, Z Li, J Liu, Y Chen, B Yuan ICASSP 2020-2020 IEEE international conference on acoustics, speech and …, 2020 | 108 | 2020 |
Practical adversarial attacks against speaker recognition systems Z Li, C Shi, Y Xie, J Liu, B Yuan, Y Chen Proceedings of the 21st international workshop on mobile computing systems …, 2020 | 103 | 2020 |
WiFi-enabled smart human dynamics monitoring X Guo, B Liu, C Shi, H Liu, Y Chen, MC Chuah Proceedings of the 15th ACM conference on embedded network sensor systems, 1-13, 2017 | 84 | 2017 |
Device-free personalized fitness assistant using WiFi X Guo, J Liu, C Shi, H Liu, Y Chen, MC Chuah Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018 | 82 | 2018 |
Enabling fast and universal audio adversarial attack using generative model Y Xie, Z Li, C Shi, J Liu, Y Chen, B Yuan Proceedings of the AAAI conference on artificial intelligence 35 (16), 14129 …, 2021 | 74 | 2021 |
Simultaneous monitoring of multiple people’s vital sign leveraging a single phased-MIMO radar Z Xu, C Shi, T Zhang, S Li, Y Yuan, CTM Wu, Y Chen, A Petropulu IEEE Journal of Electromagnetics, RF and Microwaves in Medicine and Biology …, 2022 | 63 | 2022 |
Face-Mic: inferring live speech and speaker identity via subtle facial dynamics captured by AR/VR motion sensors C Shi, X Xu, T Zhang, P Walker, Y Wu, J Liu, N Saxena, Y Chen, J Yu Proceedings of the 27th Annual International Conference on Mobile Computing …, 2021 | 62 | 2021 |
Audio-domain position-independent backdoor attack via unnoticeable triggers C Shi, T Zhang, Z Li, H Phan, T Zhao, Y Wang, J Liu, B Yuan, Y Chen Proceedings of the 28th Annual International Conference on Mobile Computing …, 2022 | 50 | 2022 |
Robust detection of machine-induced audio attacks in intelligent audio systems with microphone array Z Li, C Shi, T Zhang, Y Xie, J Liu, B Yuan, Y Chen Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 37 | 2021 |
mPose: Environment-and subject-agnostic 3D skeleton posture reconstruction leveraging a single mmWave device C Shi, L Lu, J Liu, Y Wang, Y Chen, J Yu Smart Health 23, 100228, 2022 | 36 | 2022 |
WiFi-enabled user authentication through deep learning in daily activities C Shi, J Liu, H Liu, Y Chen ACM Transactions on Internet of Things 2 (2), 1-25, 2021 | 32 | 2021 |
Privacy leakage via unrestricted motion-position sensors in the age of virtual reality: A study of snooping typed input on virtual keyboards Y Wu, C Shi, T Zhang, P Walker, J Liu, N Saxena, Y Chen 2023 IEEE Symposium on Security and Privacy (SP), 3382-3398, 2023 | 27 | 2023 |
Real-time, robust and adaptive universal adversarial attacks against speaker recognition systems Y Xie, Z Li, C Shi, J Liu, Y Chen, B Yuan Journal of signal processing systems, 1-14, 2021 | 26 | 2021 |
CardioCam: Leveraging Camera on Mobile Devices to Verify Users While Their Heart is Pumping J Liu, C Shi, Y Chen, H Liu, M Gruteser Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019 | 25 | 2019 |
Improvement of the depth resolution in depth-resolved wavenumber-scanning interferometry using multiple uncorrelated wavenumber bands J Xu, Y Liu, B Dong, Y Bai, L Hu, C Shi, Z Xu, Y Zhou Applied Optics 52 (20), 4890-4897, 2013 | 25 | 2013 |
Towards environment-independent behavior-based user authentication using wifi C Shi, J Liu, N Borodinov, B Leao, Y Chen 2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems …, 2020 | 24 | 2020 |
WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training C Shi, Y Wang, Y Chen, N Saxena, C Wang Annual Computer Security Applications Conference, 829–842, 2020 | 22 | 2020 |
Environment-independent in-baggage object identification using WiFi signals C Shi, T Zhao, Y Xie, T Zhang, Y Wang, X Guo, Y Chen 2021 IEEE 18th international conference on mobile ad hoc and smart systems …, 2021 | 12 | 2021 |
Disdet: Exploring detectability of backdoor attack on diffusion models Y Sui, H Phan, J Xiao, T Zhang, Z Tang, C Shi, Y Wang, Y Chen, B Yuan arXiv preprint arXiv:2402.02739, 2024 | 11 | 2024 |