A review of intentional electromagnetic interference in power electronics: Conducted and radiated susceptibility

H Jie, Z Zhao, Y Zeng, Y Chang, F Fan… - IET Power …, 2024 - Wiley Online Library
With the advancements in Industry 4.0 and the global demand for sustainable energy, power
electronics devices are emerging as pivotal components for modern industrial …

{GlitchHiker}: Uncovering vulnerabilities of image signal transmission with {IEMI}

Q Jiang, X Ji, C Yan, Z **e, H Lou, W Xu - 32nd USENIX Security …, 2023 - usenix.org
Cameras have evolved into one of the most important gadgets in a variety of applications. In
this paper, we identify a new class of vulnerabilities involving the hitherto disregarded image …

Magbackdoor: Beware of your loudspeaker as a backdoor for magnetic injection attacks

T Liu, F Lin, Z Wang, C Wang, Z Ba, L Lu… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
An audio system containing loudspeakers and microphones is the fundamental hardware for
voice-enabled devices, enabling voice interaction with mobile applications and smart …

[PDF][PDF] Ghosttype: The limits of using contactless electromagnetic interference to inject phantom keys into analog circuits of keyboards

Q Jiang, Y Ren, Y Long, C Yan, Y Sun… - Network and …, 2024 - researchgate.net
Keyboards are the primary peripheral input devices for various critical computer application
scenarios. This paper performs a security analysis of the keyboard sensing mechanisms and …

EMI-LiDAR: Uncovering vulnerabilities of LiDAR sensors in autonomous driving setting using electromagnetic interference

SHV Bhupathiraju, J Sheldon, LA Bauer… - Proceedings of the 16th …, 2023 - dl.acm.org
Autonomous Vehicles (AVs) using LiDAR-based object detection systems are rapidly
improving and becoming an increasingly viable method of transportation. While effective at …

Learning normality is enough: a software-based mitigation against inaudible voice attacks

X Li, X Ji, C Yan, C Li, Y Li, Z Zhang, W Xu - 32nd USENIX Security …, 2023 - usenix.org
Inaudible voice attacks silently inject malicious voice commands into voice assistants to
manipulate voice-controlled devices such as smart speakers. To alleviate such threats for …

Routing technique for microwave transmission lines to ensure UWB interference immunity

YS Zhechev, AO Belousov… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
This article presents a novel routing technique for designing microwave transmission lines
(TLs) that provide improved functionality. Unlike traditional practices, we propose locating …

High-efficiency low-pass reflectionless filter based on modal decomposition and electromagnetic absorber

YS Zhechev, MS Murmansky, SV Vlasov… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The article introduces a novel, highly miniaturized, low-pass reflectionless filter that
leverages electromagnetic absorber and modal decomposition technologies. The filter is …

Intelligent configuration method based on UAV-driven frequency selective surface for communication band shielding

J Tan, X Dai, F Tang, M Zhao… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the explosive growth of mobile devices and communication facilities, electromagnetic
interference (EMI) has become a common phenomenon affecting the communication band …

How perceptions of trust and intrusiveness affect the adoption of voice activated personal assistants

D Pal, MD Babakerkhell, P Roy - IEEE Access, 2022 - ieeexplore.ieee.org
Voice Activated Personal Assistants (VAPA) are unique and different from other Information
Systems (IS) due to their personalized, intelligent, and human-like behavior. Given the …