My smartphone knows what you print: Exploring smartphone-based side-channel attacks against 3d printers C Song, F Lin, Z Ba, K Ren, C Zhou, W Xu Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 147 | 2016 |
Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer. Z Ba, T Zheng, X Zhang, Z Qin, B Li, X Liu, K Ren NDSS 2020, 1-18, 2020 | 117 | 2020 |
Avoid-df: Audio-visual joint learning for detecting deepfake W Yang, X Zhou, Z Chen, B Guo, Z Ba, Z Xia, X Cao, K Ren IEEE Transactions on Information Forensics and Security 18, 2015-2029, 2023 | 88 | 2023 |
Wavoice: A noise-resistant multi-modal speech recognition system fusing mmwave and audio signals T Liu, M Gao, F Lin, C Wang, Z Ba, J Han, W Xu, K Ren Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems …, 2021 | 79 | 2021 |
Towards query-efficient adversarial attacks against automatic speech recognition systems Q Wang, B Zheng, Q Li, C Shen, Z Ba IEEE Transactions on Information Forensics and Security 16, 896-908, 2020 | 66 | 2020 |
ABC: Enabling smartphone authentication with built-in camera Z Ba, S Piao, X Fu, D Koutsonikolas, A Mohaisen, K Ren 25th Annual Network and Distributed System Security Symposium, NDSS 2018, 2018 | 46 | 2018 |
Automating CSI measurement with UAVs: From problem formulation to energy-optimal solution S Piao, Z Ba, L Su, D Koutsonikolas, S Li, K Ren IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2404-2412, 2019 | 40 | 2019 |
mmphone: Acoustic eavesdropping on loudspeakers via mmwave-characterized piezoelectric effect C Wang, F Lin, T Liu, Z Liu, Y Shen, Z Ba, L Lu, W Xu, K Ren IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 820-829, 2022 | 34 | 2022 |
Locate and verify: A two-stream network for improved deepfake detection C Shuai, J Zhong, S Wu, F Lin, Z Wang, Z Ba, Z Liu, L Cavallaro, K Ren Proceedings of the 31st ACM International Conference on Multimedia, 7131-7142, 2023 | 25 | 2023 |
Privacyasst: Safeguarding user privacy in tool-using large language model agents X Zhang, H Xu, Z Ba, Z Wang, Y Hong, J Liu, Z Qin, K Ren IEEE Transactions on Dependable and Secure Computing, 2024 | 23 | 2024 |
Transferring audio deepfake detection capability across languages Z Ba, Q Wen, P Cheng, Y Wang, F Lin, L Lu, Z Liu Proceedings of the ACM Web Conference 2023, 2033-2044, 2023 | 23 | 2023 |
Wavesdropper: Through-wall word detection of human speech via commercial mmWave devices C Wang, F Lin, Z Ba, F Zhang, W Xu, K Ren Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2022 | 22 | 2022 |
Camradar: Hidden camera detection leveraging amplitude-modulated sensor images embedded in electromagnetic emanations Z Liu, F Lin, C Wang, Y Shen, Z Ba, L Lu, W Xu, K Ren Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2023 | 19 | 2023 |
PhoneyTalker: An out-of-the-box toolkit for adversarial example attack on speaker recognition M Chen, L Lu, Z Ba, K Ren IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 1419-1428, 2022 | 17 | 2022 |
Text-crs: A generalized certified robustness framework against textual adversarial attacks X Zhang, H Hong, Y Hong, P Huang, B Wang, Z Ba, K Ren 2024 IEEE Symposium on Security and Privacy (SP), 2920-2938, 2024 | 16 | 2024 |
Is imitation all you need? generalized decision-making with dual-phase training Y Wei, Y Sun, R Zheng, S Vemprala, R Bonatti, S Chen, R Madaan, Z Ba, ... Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023 | 16 | 2023 |
Toward hardware-rooted smartphone authentication K Ren, Z Qin, Z Ba IEEE Wireless Communications 26 (1), 114-119, 2019 | 16 | 2019 |
Exposing the deception: Uncovering more forgery clues for deepfake detection Z Ba, Q Liu, Z Liu, S Wu, F Lin, L Lu, K Ren Proceedings of the AAAI Conference on Artificial Intelligence 38 (2), 719-728, 2024 | 15 | 2024 |
Dfil: Deepfake incremental learning by exploiting domain-invariant forgery clues K Pan, Y Yin, Y Wei, F Lin, Z Ba, Z Liu, Z Wang, L Cavallaro, K Ren Proceedings of the 31st ACM International Conference on Multimedia, 8035-8046, 2023 | 15 | 2023 |
Magbackdoor: Beware of your loudspeaker as a backdoor for magnetic injection attacks T Liu, F Lin, Z Wang, C Wang, Z Ba, L Lu, W Xu, K Ren 2023 IEEE Symposium on Security and Privacy (SP), 3416-3431, 2023 | 13 | 2023 |