Black-box adversarial attacks on commercial speech platforms with minimal information B Zheng, P Jiang, Q Wang, Q Li, C Shen, C Wang, Y Ge, Q Teng, S Zhang Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021 | 86 | 2021 |
Stealing your android patterns via acoustic signals M Zhou, Q Wang, J Yang, Q Li, P Jiang, Y Chen, Z Wang IEEE Transactions on Mobile Computing 20 (4), 1656-1671, 2019 | 33 | 2019 |
GraphShield: Dynamic large graphs for secure queries with forward privacy M Du, S Wu, Q Wang, D Chen, P Jiang, A Mohaisen IEEE Transactions on Knowledge and Data Engineering 34 (7), 3295-3308, 2020 | 27 | 2020 |
Building in-the-cloud network functions: Security and privacy challenges P Jiang, Q Wang, M Huang, C Wang, Q Li, C Shen, K Ren Proceedings of the IEEE 109 (12), 1888-1919, 2021 | 23 | 2021 |
Securing liveness detection for voice authentication via pop noises P Jiang, Q Wang, X Lin, M Zhou, W Ding, C Wang, C Shen, Q Li IEEE Transactions on Dependable and Secure Computing 20 (2), 1702-1718, 2022 | 18 | 2022 |
Securing face liveness detection using unforgeable lip motion patterns M Zhou, Q Wang, Q Li, P Jiang, J Yang, C Shen, C Wang, S Ding arXiv preprint arXiv:2106.08013, 2021 | 15 | 2021 |
Soundid: Securing mobile two-factor authentication via acoustic signals D Liu, Q Wang, M Zhou, P Jiang, Q Li, C Shen, C Wang IEEE Transactions on Dependable and Secure Computing 20 (2), 1687-1701, 2022 | 14 | 2022 |
Presspin: Enabling secure pin authentication on mobile devices via structure-borne sounds M Zhou, Q Wang, X Lin, Y Zhao, P Jiang, Q Li, C Shen, C Wang IEEE Transactions on Dependable and Secure Computing 20 (2), 1228-1242, 2022 | 13 | 2022 |
Boomerang:{Metadata-Private} Messaging under Hardware Trust P Jiang, Q Wang, J Cheng, C Wang, L Xu, X Wang, Y Wu, X Li, K Ren 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2023 | 8 | 2023 |
Shielding graph for eXact analytics with SGX M Du, P Jiang, Q Wang, SSM Chow, L Zhao IEEE Transactions on Dependable and Secure Computing 20 (6), 5102-5112, 2023 | 5 | 2023 |
Poster: Metadata-private Messaging without Coordination P Jiang, Q Wang, Y Wu, C Wang Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 2 | 2023 |
Perception-driven Imperceptible Adversarial Attack against Decision-based Black-box Models S Zhang, B Zheng, P Jiang, L Zhao, C Shen, Q Wang IEEE Transactions on Information Forensics and Security, 2024 | 1 | 2024 |
Hijacking Attacks against Neural Networks by Analyzing Training Data Y Ge, Q Wang, H Huang, Q Li, C Wang, C Shen, L Zhao, P Jiang, Z Fang, ... arXiv preprint arXiv:2401.09740, 2024 | 1 | 2024 |
Ring of Gyges: Accountable Anonymous Broadcast via Secret-Shared Shuffle W Dong, P Jiang, H Duan, C Wang, L Zhao, Q Wang NDSS Symposium 2025, 2024 | | 2024 |
More Simplicity for Trainers, More Opportunity for Attackers:{Black-Box} Attacks on Speaker Recognition Systems by Inferring Feature Extractor Y Ge, P Chen, Q Wang, L Zhao, N Mou, P Jiang, C Wang, Q Li, C Shen 33rd USENIX Security Symposium (USENIX Security 24), 2973-2990, 2024 | | 2024 |