Follow
Zhe Zhou
Zhe Zhou
Verified email at fudan.edu.cn - Homepage
Title
Cited by
Cited by
Year
When good becomes evil: Keystroke inference with smartwatch
X Liu, Z Zhou, W Diao, Z Li, K Zhang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2392015
Your voice assistant is mine: How to abuse speakers to steal information and control your phone
W Diao, X Liu, Z Zhou, K Zhang
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
2082014
Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound
Z Zhou, W Diao, X Liu, K Zhang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1272014
On code execution tracking via power side-channel
Y Liu, L Wei, Z Zhou, K Zhang, W Xu, Q Xu
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
972016
Invisible mask: Practical attacks on face recognition with infrared
Z Zhou, D Tang, X Wang, W Han, X Liu, K Zhang
arXiv preprint arXiv:1803.04683, 2018
892018
Leaky dnn: Stealing deep-learning model secret with gpu context-switching side-channel
J Wei, Y Zhang, Z Zhou, Z Li, MA Al Faruque
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
862020
Face flashing: a secure liveness detection protocol based on light reflections
D Tang, Z Zhou, Y Zhang, K Zhang
arXiv preprint arXiv:1801.01949, 2018
712018
A survey of practical adversarial example attacks
L Sun, M Tan, Z Zhou
Cybersecurity 1 (1), 9, 2018
492018
Vulnerable gpu memory management: towards recovering raw data from gpu
Z Zhou, W Diao, X Liu, Z Li, K Zhang, R Liu
arXiv preprint arXiv:1605.06610, 2016
382016
Picking up my tab: Understanding and mitigating synchronized token lifting and spending in mobile payment
X Bai, Z Zhou, XF Wang, Z Li, X Mi, N Zhang, T Li, SM Hu, K Zhang
26th USENIX Security Symposium (USENIX Security 17), 593-608, 2017
362017
MeshUp: Stateless cache side-channel attack on CPU mesh
J Wan, Y Bi, Z Zhou, Z Li
2022 IEEE Symposium on Security and Privacy (SP), 1506-1524, 2022
282022
Invisible probe: Timing attacks with pcie congestion side-channel
M Tan, J Wan, Z Zhou, Z Li
2021 IEEE Symposium on Security and Privacy (SP), 322-338, 2021
272021
Privacy-preserving Wi-Fi fingerprinting indoor localization
T Zhang, SSM Chow, Z Zhou, M Li
Advances in Information and Computer Security: 11th International Workshop …, 2016
262016
An empirical study on android for saving non-shared data on public storage
X Liu, Z Zhou, W Diao, Z Li, K Zhang
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015
242015
RoLMA: a practical adversarial attack against deep learning-based LPR systems
M Zha, G Meng, C Lin, Z Zhou, K Chen
Information Security and Cryptology: 15th International Conference, Inscrypt …, 2020
192020
Efficient authenticated multi-pattern matching
Z Zhou, T Zhang, SSM Chow, Y Zhang, K Zhang
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
122016
Mind-reading: Privacy attacks exploiting cross-app KeyEvent injections
W Diao, X Liu, Z Zhou, K Zhang, Z Li
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
72015
All your VMs are disconnected: Attacking hardware virtualized network
Z Zhou, Z Li, K Zhang
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
62017
Gateless treasure: How to get sensitive information from unprotected external storage on Android phones
X Liu, W Diao, Z Zhou, Z Li, K Zhang
CoRR, vol. abs/1407.5410, 2014
62014
Volcano: Stateless cache side-channel attack by exploiting mesh interconnect
J Wan, Y Bi, Z Zhou, Z Li
arXiv preprint arXiv:2103.04533, 2021
52021
The system can't perform the operation now. Try again later.
Articles 1–20