Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT C Shi, J Liu, H Liu, Y Chen Proceedings of the 18th ACM international symposium on mobile ad hoc …, 2017 | 291 | 2017 |
Real-time, universal, and robust adversarial attacks against speaker recognition systems Y Xie, C Shi, Z Li, J Liu, Y Chen, B Yuan ICASSP 2020-2020 IEEE international conference on acoustics, speech and …, 2020 | 98 | 2020 |
Practical adversarial attacks against speaker recognition systems Z Li, C Shi, Y Xie, J Liu, B Yuan, Y Chen Proceedings of the 21st international workshop on mobile computing systems …, 2020 | 84 | 2020 |
Device-free personalized fitness assistant using WiFi X Guo, J Liu, C Shi, H Liu, Y Chen, MC Chuah Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018 | 71 | 2018 |
WiFi-enabled smart human dynamics monitoring X Guo, B Liu, C Shi, H Liu, Y Chen, MC Chuah Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 1-13, 2017 | 71 | 2017 |
Enabling fast and universal audio adversarial attack using generative model Y Xie, Z Li, C Shi, J Liu, Y Chen, B Yuan Proceedings of the AAAI conference on artificial intelligence 35 (16), 14129 …, 2021 | 58 | 2021 |
Face-Mic: inferring live speech and speaker identity via subtle facial dynamics captured by AR/VR motion sensors C Shi, X Xu, T Zhang, P Walker, Y Wu, J Liu, N Saxena, Y Chen, J Yu Proceedings of the 27th Annual International Conference on Mobile Computing …, 2021 | 41 | 2021 |
Simultaneous monitoring of multiple people’s vital sign leveraging a single phased-MIMO radar Z Xu, C Shi, T Zhang, S Li, Y Yuan, CTM Wu, Y Chen, A Petropulu IEEE Journal of Electromagnetics, RF and Microwaves in Medicine and Biology …, 2022 | 35 | 2022 |
Robust detection of machine-induced audio attacks in intelligent audio systems with microphone array Z Li, C Shi, T Zhang, Y Xie, J Liu, B Yuan, Y Chen Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 29 | 2021 |
Improvement of the depth resolution in depth-resolved wavenumber-scanning interferometry using multiple uncorrelated wavenumber bands J Xu, Y Liu, B Dong, Y Bai, L Hu, C Shi, Z Xu, Y Zhou Applied Optics 52 (20), 4890-4897, 2013 | 25 | 2013 |
Audio-domain position-independent backdoor attack via unnoticeable triggers C Shi, T Zhang, Z Li, H Phan, T Zhao, Y Wang, J Liu, B Yuan, Y Chen Proceedings of the 28th Annual International Conference on Mobile Computing …, 2022 | 22 | 2022 |
mPose: Environment-and subject-agnostic 3D skeleton posture reconstruction leveraging a single mmWave device C Shi, L Lu, J Liu, Y Wang, Y Chen, J Yu Smart Health 23, 100228, 2022 | 22 | 2022 |
CardioCam: Leveraging Camera on Mobile Devices to Verify Users While Their Heart is Pumping J Liu, C Shi, Y Chen, H Liu, M Gruteser Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019 | 21 | 2019 |
WiFi-enabled user authentication through deep learning in daily activities C Shi, J Liu, H Liu, Y Chen ACM Transactions on Internet of Things 2 (2), 1-25, 2021 | 20 | 2021 |
WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training C Shi, Y Wang, Y Chen, N Saxena, C Wang Annual Computer Security Applications Conference, 829–842, 2020 | 17 | 2020 |
Real-time, robust and adaptive universal adversarial attacks against speaker recognition systems Y Xie, Z Li, C Shi, J Liu, Y Chen, B Yuan Journal of signal processing systems, 1-14, 2021 | 16 | 2021 |
Towards environment-independent behavior-based user authentication using wifi C Shi, J Liu, N Borodinov, B Leao, Y Chen 2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems …, 2020 | 15 | 2020 |
Environment-independent in-baggage object identification using WiFi signals C Shi, T Zhao, Y Xie, T Zhang, Y Wang, X Guo, Y Chen 2021 IEEE 18th international conference on mobile ad hoc and smart systems …, 2021 | 8 | 2021 |
Secret key distribution leveraging color shift over visible light channel H Liu, B Liu, C Shi, Y Chen 2017 IEEE Conference on Communications and Network Security (CNS), 1-9, 2017 | 8 | 2017 |
Privacy leakage via unrestricted motion-position sensors in the age of virtual reality: A study of snooping typed input on virtual keyboards Y Wu, C Shi, T Zhang, P Walker, J Liu, N Saxena, Y Chen 2023 IEEE Symposium on Security and Privacy (SP), 3382-3398, 2023 | 6 | 2023 |