When good becomes evil: Keystroke inference with smartwatch X Liu, Z Zhou, W Diao, Z Li, K Zhang Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 213 | 2015 |
Your voice assistant is mine: How to abuse speakers to steal information and control your phone W Diao, X Liu, Z Zhou, K Zhang Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014 | 181 | 2014 |
Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound Z Zhou, W Diao, X Liu, K Zhang Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 118 | 2014 |
On code execution tracking via power side-channel Y Liu, L Wei, Z Zhou, K Zhang, W Xu, Q Xu Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 76 | 2016 |
Invisible mask: Practical attacks on face recognition with infrared Z Zhou, D Tang, X Wang, W Han, X Liu, K Zhang arXiv preprint arXiv:1803.04683, 2018 | 68 | 2018 |
Face flashing: a secure liveness detection protocol based on light reflections D Tang, Z Zhou, Y Zhang, K Zhang arXiv preprint arXiv:1801.01949, 2018 | 57 | 2018 |
Leaky dnn: Stealing deep-learning model secret with gpu context-switching side-channel J Wei, Y Zhang, Z Zhou, Z Li, MA Al Faruque 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020 | 49 | 2020 |
A survey of practical adversarial example attacks L Sun, M Tan, Z Zhou Cybersecurity 1, 1-9, 2018 | 36 | 2018 |
Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment. X Bai, Z Zhou, XF Wang, Z Li, X Mi, N Zhang, T Li, SM Hu, K Zhang USENIX Security Symposium, 593-608, 2017 | 31 | 2017 |
Vulnerable gpu memory management: towards recovering raw data from gpu Z Zhou, W Diao, X Liu, Z Li, K Zhang, R Liu arXiv preprint arXiv:1605.06610, 2016 | 31 | 2016 |
An empirical study on android for saving non-shared data on public storage X Liu, Z Zhou, W Diao, Z Li, K Zhang ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015 | 23 | 2015 |
Privacy-preserving Wi-Fi fingerprinting indoor localization T Zhang, SSM Chow, Z Zhou, M Li Advances in Information and Computer Security: 11th International Workshop …, 2016 | 17 | 2016 |
RoLMA: a practical adversarial attack against deep learning-based LPR systems M Zha, G Meng, C Lin, Z Zhou, K Chen Information Security and Cryptology: 15th International Conference, Inscrypt …, 2020 | 14 | 2020 |
Invisible probe: Timing attacks with pcie congestion side-channel M Tan, J Wan, Z Zhou, Z Li 2021 IEEE Symposium on Security and Privacy (SP), 322-338, 2021 | 13 | 2021 |
Efficient authenticated multi-pattern matching Z Zhou, T Zhang, SSM Chow, Y Zhang, K Zhang Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 11 | 2016 |
MeshUp: Stateless cache side-channel attack on CPU mesh J Wan, Y Bi, Z Zhou, Z Li 2022 IEEE Symposium on Security and Privacy (SP), 1506-1524, 2022 | 10 | 2022 |
All your vms are disconnected: Attacking hardware virtualized network Z Zhou, Z Li, K Zhang Proceedings of the Seventh ACM on Conference on Data and Application …, 2017 | 7 | 2017 |
Mind-reading: Privacy attacks exploiting cross-app keyevent injections W Diao, X Liu, Z Zhou, K Zhang, Z Li Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 6 | 2015 |
Volcano: Stateless cache side-channel attack by exploiting mesh interconnect J Wan, Y Bi, Z Zhou, Z Li arXiv preprint arXiv:2103.04533, 2021 | 4 | 2021 |
Gateless treasure: How to get sensitive information from unprotected external storage on Android phones X Liu, W Diao, Z Zhou, Z Li, K Zhang CoRR, vol. abs/1407.5410, 2014 | 4 | 2014 |