关注
Peipei Jiang
Peipei Jiang
在 my.cityu.edu.hk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Black-box adversarial attacks on commercial speech platforms with minimal information
B Zheng, P Jiang, Q Wang, Q Li, C Shen, C Wang, Y Ge, Q Teng, S Zhang
Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021
862021
Stealing your android patterns via acoustic signals
M Zhou, Q Wang, J Yang, Q Li, P Jiang, Y Chen, Z Wang
IEEE Transactions on Mobile Computing 20 (4), 1656-1671, 2019
332019
GraphShield: Dynamic large graphs for secure queries with forward privacy
M Du, S Wu, Q Wang, D Chen, P Jiang, A Mohaisen
IEEE Transactions on Knowledge and Data Engineering 34 (7), 3295-3308, 2020
272020
Building in-the-cloud network functions: Security and privacy challenges
P Jiang, Q Wang, M Huang, C Wang, Q Li, C Shen, K Ren
Proceedings of the IEEE 109 (12), 1888-1919, 2021
232021
Securing liveness detection for voice authentication via pop noises
P Jiang, Q Wang, X Lin, M Zhou, W Ding, C Wang, C Shen, Q Li
IEEE Transactions on Dependable and Secure Computing 20 (2), 1702-1718, 2022
182022
Securing face liveness detection using unforgeable lip motion patterns
M Zhou, Q Wang, Q Li, P Jiang, J Yang, C Shen, C Wang, S Ding
arXiv preprint arXiv:2106.08013, 2021
152021
Soundid: Securing mobile two-factor authentication via acoustic signals
D Liu, Q Wang, M Zhou, P Jiang, Q Li, C Shen, C Wang
IEEE Transactions on Dependable and Secure Computing 20 (2), 1687-1701, 2022
142022
Presspin: Enabling secure pin authentication on mobile devices via structure-borne sounds
M Zhou, Q Wang, X Lin, Y Zhao, P Jiang, Q Li, C Shen, C Wang
IEEE Transactions on Dependable and Secure Computing 20 (2), 1228-1242, 2022
132022
Boomerang:{Metadata-Private} Messaging under Hardware Trust
P Jiang, Q Wang, J Cheng, C Wang, L Xu, X Wang, Y Wu, X Li, K Ren
20th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2023
82023
Shielding graph for eXact analytics with SGX
M Du, P Jiang, Q Wang, SSM Chow, L Zhao
IEEE Transactions on Dependable and Secure Computing 20 (6), 5102-5112, 2023
52023
Poster: Metadata-private Messaging without Coordination
P Jiang, Q Wang, Y Wu, C Wang
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
22023
Perception-driven Imperceptible Adversarial Attack against Decision-based Black-box Models
S Zhang, B Zheng, P Jiang, L Zhao, C Shen, Q Wang
IEEE Transactions on Information Forensics and Security, 2024
12024
Hijacking Attacks against Neural Networks by Analyzing Training Data
Y Ge, Q Wang, H Huang, Q Li, C Wang, C Shen, L Zhao, P Jiang, Z Fang, ...
arXiv preprint arXiv:2401.09740, 2024
12024
Ring of Gyges: Accountable Anonymous Broadcast via Secret-Shared Shuffle
W Dong, P Jiang, H Duan, C Wang, L Zhao, Q Wang
NDSS Symposium 2025, 2024
2024
More Simplicity for Trainers, More Opportunity for Attackers:{Black-Box} Attacks on Speaker Recognition Systems by Inferring Feature Extractor
Y Ge, P Chen, Q Wang, L Zhao, N Mou, P Jiang, C Wang, Q Li, C Shen
33rd USENIX Security Symposium (USENIX Security 24), 2973-2990, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–15