Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Zhongjie Ba
@article{DBLP:journals/tdsc/ChengWHBLLR24, author = {Peng Cheng and Yuexin Wu and Yuan Hong and Zhongjie Ba and Feng Lin and Li Lu and Kui Ren}, title = {UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {31--46}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3242292}, doi = {10.1109/TDSC.2023.3242292}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ChengWHBLLR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShenLWLBLXR24, author = {Yijie Shen and Feng Lin and Chao Wang and Tiantian Liu and Zhongjie Ba and Li Lu and Wenyao Xu and Kui Ren}, title = {MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {372--387}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3253507}, doi = {10.1109/TDSC.2023.3253507}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ShenLWLBLXR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenLYBLR24, author = {Meng Chen and Li Lu and Jiadi Yu and Zhongjie Ba and Feng Lin and Kui Ren}, title = {AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {1948--1962}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3345639}, doi = {10.1109/TIFS.2023.3345639}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ChenLYBLR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/BaLLWLL024, author = {Zhongjie Ba and Qingyu Liu and Zhenguang Liu and Shuang Wu and Feng Lin and Li Lu and Kui Ren}, editor = {Michael J. Wooldridge and Jennifer G. Dy and Sriraam Natarajan}, title = {Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection}, booktitle = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI} 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver, Canada}, pages = {719--728}, publisher = {{AAAI} Press}, year = {2024}, url = {https://doi.org/10.1609/aaai.v38i2.27829}, doi = {10.1609/AAAI.V38I2.27829}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/BaLLWLL024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iui/ChenGLXBLL024, author = {Qianniu Chen and Zhehan Gu and Li Lu and Xiangyu Xu and Zhongjie Ba and Feng Lin and Zhenguang Liu and Kui Ren}, title = {Conan's Bow Tie: {A} Streaming Voice Conversion for Real-Time VTuber Livestreaming}, booktitle = {Proceedings of the 29th International Conference on Intelligent User Interfaces, {IUI} 2024, Greenville, SC, USA, March 18-21, 2024}, pages = {35--50}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3640543.3645146}, doi = {10.1145/3640543.3645146}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iui/ChenGLXBLL024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-15704, author = {Peng Huang and Yao Wei and Peng Cheng and Zhongjie Ba and Li Lu and Feng Lin and Yang Wang and Kui Ren}, title = {Phoneme-Based Proactive Anti-Eavesdropping with Controlled Recording Privilege}, journal = {CoRR}, volume = {abs/2401.15704}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.15704}, doi = {10.48550/ARXIV.2401.15704}, eprinttype = {arXiv}, eprint = {2401.15704}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-15704.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-01786, author = {Zhongjie Ba and Qingyu Liu and Zhenguang Liu and Shuang Wu and Feng Lin and Li Lu and Kui Ren}, title = {Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection}, journal = {CoRR}, volume = {abs/2403.01786}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.01786}, doi = {10.48550/ARXIV.2403.01786}, eprinttype = {arXiv}, eprint = {2403.01786}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-01786.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imwut/WangCLBLR23, author = {Lei Wang and Meng Chen and Li Lu and Zhongjie Ba and Feng Lin and Kui Ren}, title = {VoiceListener: {A} Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices}, journal = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.}, volume = {7}, number = {1}, pages = {32:1--32:22}, year = {2023}, url = {https://doi.org/10.1145/3580789}, doi = {10.1145/3580789}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imwut/WangCLBLR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imwut/Chen0WY00B0023, author = {Meng Chen and Li Lu and Junhao Wang and Jiadi Yu and Yingying Chen and Zhibo Wang and Zhongjie Ba and Feng Lin and Kui Ren}, title = {VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility}, journal = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.}, volume = {7}, number = {2}, pages = {48:1--48:21}, year = {2023}, url = {https://doi.org/10.1145/3596266}, doi = {10.1145/3596266}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imwut/Chen0WY00B0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GaoLCLBXHR23, author = {Ming Gao and Yajie Liu and Yike Chen and Yimin Li and Zhongjie Ba and Xian Xu and Jinsong Han and Kui Ren}, title = {Device-Independent Smartphone Eavesdropping Jointly Using Accelerometer and Gyroscope}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {4}, pages = {3144--3157}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3193130}, doi = {10.1109/TDSC.2022.3193130}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GaoLCLBXHR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangZCGBXCR23, author = {Wenyuan Yang and Xiaoyu Zhou and Zhikai Chen and Bofei Guo and Zhongjie Ba and Zhihua Xia and Xiaochun Cao and Kui Ren}, title = {AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {2015--2029}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3262148}, doi = {10.1109/TIFS.2023.3262148}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangZCGBXCR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuFCWBLL023, author = {Liu Liu and Xinwen Fu and Xiaodong Chen and Jianpeng Wang and Zhongjie Ba and Feng Lin and Li Lu and Kui Ren}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {{FITS:} Matching Camera Fingerprints Subject to Software Noise Pollution}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {1660--1674}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3616600}, doi = {10.1145/3576915.3616600}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuFCWBLL023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/WangLBLR23, author = {Junhao Wang and Li Lu and Zhongjie Ba and Feng Lin and Kui Ren}, title = {Shift to Your Device: Data Augmentation for Device-Independent Speaker Verification Anti-Spoofing}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing {ICASSP} 2023, Rhodes Island, Greece, June 4-10, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICASSP49357.2023.10097168}, doi = {10.1109/ICASSP49357.2023.10097168}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icassp/WangLBLR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/WeiSZVBCMBKM23, author = {Yao Wei and Yanchao Sun and Ruijie Zheng and Sai Vemprala and Rogerio Bonatti and Shuhang Chen and Ratnesh Madaan and Zhongjie Ba and Ashish Kapoor and Shuang Ma}, title = {Is Imitation All You Need? Generalized Decision-Making with Dual-Phase Training}, booktitle = {{IEEE/CVF} International Conference on Computer Vision, {ICCV} 2023, Paris, France, October 1-6, 2023}, pages = {16175--16185}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCV51070.2023.01486}, doi = {10.1109/ICCV51070.2023.01486}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccv/WeiSZVBCMBKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/ShuaiZ0LWBLC023, author = {Chao Shuai and Jieming Zhong and Shuang Wu and Feng Lin and Zhibo Wang and Zhongjie Ba and Zhenguang Liu and Lorenzo Cavallaro and Kui Ren}, editor = {Abdulmotaleb El{-}Saddik and Tao Mei and Rita Cucchiara and Marco Bertini and Diana Patricia Tobon Vallejo and Pradeep K. Atrey and M. Shamim Hossain}, title = {Locate and Verify: {A} Two-Stream Network for Improved Deepfake Detection}, booktitle = {Proceedings of the 31st {ACM} International Conference on Multimedia, {MM} 2023, Ottawa, ON, Canada, 29 October 2023- 3 November 2023}, pages = {7131--7142}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3581783.3612386}, doi = {10.1145/3581783.3612386}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/ShuaiZ0LWBLC023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/PanYW0BL0C023, author = {Kun Pan and Yifang Yin and Yao Wei and Feng Lin and Zhongjie Ba and Zhenguang Liu and Zhibo Wang and Lorenzo Cavallaro and Kui Ren}, editor = {Abdulmotaleb El{-}Saddik and Tao Mei and Rita Cucchiara and Marco Bertini and Diana Patricia Tobon Vallejo and Pradeep K. Atrey and M. Shamim Hossain}, title = {{DFIL:} Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues}, booktitle = {Proceedings of the 31st {ACM} International Conference on Multimedia, {MM} 2023, Ottawa, ON, Canada, 29 October 2023- 3 November 2023}, pages = {8035--8046}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3581783.3612377}, doi = {10.1145/3581783.3612377}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mm/PanYW0BL0C023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HuangWCB000023, author = {Peng Huang and Yao Wei and Peng Cheng and Zhongjie Ba and Li Lu and Feng Lin and Fan Zhang and Kui Ren}, title = {InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/infomasker-preventing-eavesdropping-using-phoneme-based-noise/}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/HuangWCB000023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiuLWWBLXR23, author = {Tiantian Liu and Feng Lin and Zhangsen Wang and Chao Wang and Zhongjie Ba and Li Lu and Wenyao Xu and Kui Ren}, title = {MagBackdoor: Beware of Your Loudspeaker as {A} Backdoor For Magnetic Injection Attacks}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {3416--3431}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179364}, doi = {10.1109/SP46215.2023.10179364}, timestamp = {Thu, 24 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/LiuLWWBLXR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/BaWCWL0L23, author = {Zhongjie Ba and Qing Wen and Peng Cheng and Yuwei Wang and Feng Lin and Li Lu and Zhenguang Liu}, editor = {Ying Ding and Jie Tang and Juan F. Sequeda and Lora Aroyo and Carlos Castillo and Geert{-}Jan Houben}, title = {Transferring Audio Deepfake Detection Capability across Languages}, booktitle = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023}, pages = {2033--2044}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3543507.3583222}, doi = {10.1145/3543507.3583222}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/BaWCWL0L23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-11363, author = {Jiachen Lei and Peng Cheng and Zhongjie Ba and Kui Ren}, title = {Masked Diffusion Models are Fast Learners}, journal = {CoRR}, volume = {abs/2306.11363}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.11363}, doi = {10.48550/ARXIV.2306.11363}, eprinttype = {arXiv}, eprint = {2306.11363}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-11363.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-07909, author = {Yao Wei and Yanchao Sun and Ruijie Zheng and Sai Vemprala and Rogerio Bonatti and Shuhang Chen and Ratnesh Madaan and Zhongjie Ba and Ashish Kapoor and Shuang Ma}, title = {Is Imitation All You Need? Generalized Decision-Making with Dual-Phase Training}, journal = {CoRR}, volume = {abs/2307.07909}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.07909}, doi = {10.48550/ARXIV.2307.07909}, eprinttype = {arXiv}, eprint = {2307.07909}, timestamp = {Tue, 25 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-07909.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-16630, author = {Xinyu Zhang and Hanbin Hong and Yuan Hong and Peng Huang and Binghui Wang and Zhongjie Ba and Kui Ren}, title = {Text-CRS: {A} Generalized Certified Robustness Framework against Textual Adversarial Attacks}, journal = {CoRR}, volume = {abs/2307.16630}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.16630}, doi = {10.48550/ARXIV.2307.16630}, eprinttype = {arXiv}, eprint = {2307.16630}, timestamp = {Tue, 15 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-16630.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-09526, author = {Kun Pan and Yifang Yin and Yao Wei and Feng Lin and Zhongjie Ba and Zhenguang Liu and Zhibo Wang and Lorenzo Cavallaro and Kui Ren}, title = {{DFIL:} Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues}, journal = {CoRR}, volume = {abs/2309.09526}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.09526}, doi = {10.48550/ARXIV.2309.09526}, eprinttype = {arXiv}, eprint = {2309.09526}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-09526.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-11131, author = {Chao Shuai and Jieming Zhong and Shuang Wu and Feng Lin and Zhibo Wang and Zhongjie Ba and Zhenguang Liu and Lorenzo Cavallaro and Kui Ren}, title = {Locate and Verify: {A} Two-Stream Network for Improved Deepfake Detection}, journal = {CoRR}, volume = {abs/2309.11131}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.11131}, doi = {10.48550/ARXIV.2309.11131}, eprinttype = {arXiv}, eprint = {2309.11131}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-11131.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-14122, author = {Zhongjie Ba and Jieming Zhong and Jiachen Lei and Peng Cheng and Qinglong Wang and Zhan Qin and Zhibo Wang and Kui Ren}, title = {SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution}, journal = {CoRR}, volume = {abs/2309.14122}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.14122}, doi = {10.48550/ARXIV.2309.14122}, eprinttype = {arXiv}, eprint = {2309.14122}, timestamp = {Wed, 27 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-14122.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-13424, author = {Xinyu Zhang and Qingyu Liu and Zhongjie Ba and Yuan Hong and Tianhang Zheng and Feng Lin and Li Lu and Kui Ren}, title = {FLTracer: Accurate Poisoning Attack Provenance in Federated Learning}, journal = {CoRR}, volume = {abs/2310.13424}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.13424}, doi = {10.48550/ARXIV.2310.13424}, eprinttype = {arXiv}, eprint = {2310.13424}, timestamp = {Sat, 02 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-13424.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/ZhangLBTC22, author = {Xiao Zhang and Jiqiang Liu and Zhongjie Ba and Yaodong Tao and Xiaochun Cheng}, title = {MobiScan: An enhanced invisible screen-camera communication system for IoT applications}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {33}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/ett.4151}, doi = {10.1002/ETT.4151}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/ZhangLBTC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imwut/WangLBZXR22, author = {Chao Wang and Feng Lin and Zhongjie Ba and Fan Zhang and Wenyao Xu and Kui Ren}, title = {Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices}, journal = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.}, volume = {6}, number = {2}, pages = {77:1--77:26}, year = {2022}, url = {https://doi.org/10.1145/3534592}, doi = {10.1145/3534592}, timestamp = {Thu, 24 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imwut/WangLBZXR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imwut/LiuLWSBLXR22, author = {Ziwei Liu and Feng Lin and Chao Wang and Yijie Shen and Zhongjie Ba and Li Lu and Wenyao Xu and Kui Ren}, title = {CamRadar: Hidden Camera Detection Leveraging Amplitude-modulated Sensor Images Embedded in Electromagnetic Emanations}, journal = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.}, volume = {6}, number = {4}, pages = {173:1--173:25}, year = {2022}, url = {https://doi.org/10.1145/3569505}, doi = {10.1145/3569505}, timestamp = {Thu, 24 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imwut/LiuLWSBLXR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuWBZDH22, author = {Bingyu Liu and Rujia Wang and Zhongjie Ba and Shanglin Zhou and Caiwen Ding and Yuan Hong}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Poster: Cryptographic Inferences for Video Deep Neural Networks}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {3395--3397}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3563543}, doi = {10.1145/3548606.3563543}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuWBZDH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/LuBLHR22, author = {Li Lu and Zhongjie Ba and Feng Lin and Jinsong Han and Kui Ren}, title = {ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures}, booktitle = {42nd {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2022, Bologna, Italy, July 10-13, 2022}, pages = {776--786}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICDCS54860.2022.00080}, doi = {10.1109/ICDCS54860.2022.00080}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/LuBLHR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/WangLLLSBLXR22, author = {Chao Wang and Feng Lin and Tiantian Liu and Ziwei Liu and Yijie Shen and Zhongjie Ba and Li Lu and Wenyao Xu and Kui Ren}, title = {mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric Effect}, booktitle = {{IEEE} {INFOCOM} 2022 - {IEEE} Conference on Computer Communications, London, United Kingdom, May 2-5, 2022}, pages = {820--829}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/INFOCOM48880.2022.9796806}, doi = {10.1109/INFOCOM48880.2022.9796806}, timestamp = {Thu, 24 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/WangLLLSBLXR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/GaoLCLBXH22, author = {Ming Gao and Yajie Liu and Yike Chen and Yimin Li and Zhongjie Ba and Xian Xu and Jinsong Han}, title = {InertiEAR: Automatic and Device-independent IMU-based Eavesdropping on Smartphones}, booktitle = {{IEEE} {INFOCOM} 2022 - {IEEE} Conference on Computer Communications, London, United Kingdom, May 2-5, 2022}, pages = {1129--1138}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/INFOCOM48880.2022.9796890}, doi = {10.1109/INFOCOM48880.2022.9796890}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/GaoLCLBXH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ChenLBR22, author = {Meng Chen and Li Lu and Zhongjie Ba and Kui Ren}, title = {PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition}, booktitle = {{IEEE} {INFOCOM} 2022 - {IEEE} Conference on Computer Communications, London, United Kingdom, May 2-5, 2022}, pages = {1419--1428}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/INFOCOM48880.2022.9796934}, doi = {10.1109/INFOCOM48880.2022.9796934}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/ChenLBR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/Chen0YCB0022, author = {Meng Chen and Li Lu and Jiadi Yu and Yingying Chen and Zhongjie Ba and Feng Lin and Kui Ren}, title = {A non-intrusive and adaptive speaker de-identification scheme using adversarial examples}, booktitle = {{ACM} MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17 - 21, 2022}, pages = {853--855}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3495243.3558260}, doi = {10.1145/3495243.3558260}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobicom/Chen0YCB0022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sensys/ChenCLYCWBL022, author = {Qianniu Chen and Meng Chen and Li Lu and Jiadi Yu and Yingying Chen and Zhibo Wang and Zhongjie Ba and Feng Lin and Kui Ren}, editor = {Jeremy Gummeson and Sunghoon Ivan Lee and Jie Gao and Guoliang Xing}, title = {Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain}, booktitle = {Proceedings of the 20th {ACM} Conference on Embedded Networked Sensor Systems, SenSys 2022, Boston, Massachusetts, November 6-9, 2022}, pages = {710--724}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560905.3568518}, doi = {10.1145/3560905.3568518}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sensys/ChenCLYCWBL022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-05446, author = {Meng Chen and Li Lu and Jiadi Yu and Yingying Chen and Zhongjie Ba and Feng Lin and Kui Ren}, title = {Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples}, journal = {CoRR}, volume = {abs/2211.05446}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.05446}, doi = {10.48550/ARXIV.2211.05446}, eprinttype = {arXiv}, eprint = {2211.05446}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-05446.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-15286, author = {Jiachen Lei and Shuang Ma and Zhongjie Ba and Sai Vemprala and Ashish Kapoor and Kui Ren}, title = {Masked Autoencoders for Egocentric Video Understanding @ Ego4D Challenge 2022}, journal = {CoRR}, volume = {abs/2211.15286}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.15286}, doi = {10.48550/ARXIV.2211.15286}, eprinttype = {arXiv}, eprint = {2211.15286}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-15286.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangZLSB21, author = {Qian Wang and Baolin Zheng and Qi Li and Chao Shen and Zhongjie Ba}, title = {Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {896--908}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2020.3026543}, doi = {10.1109/TIFS.2020.3026543}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangZLSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/LiuYBLL021, author = {Liu Liu and Hanlin Yu and Zhongjie Ba and Li Lu and Feng Lin and Kui Ren}, title = {PassFace: Enabling Practical Anti-Spoofing Facial Recognition with Camera Fingerprinting}, booktitle = {{ICC} 2021 - {IEEE} International Conference on Communications, Montreal, QC, Canada, June 14-23, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICC42927.2021.9501053}, doi = {10.1109/ICC42927.2021.9501053}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/LiuYBLL021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sensys/0002G0WBHX021, author = {Tiantian Liu and Ming Gao and Feng Lin and Chao Wang and Zhongjie Ba and Jinsong Han and Wenyao Xu and Kui Ren}, editor = {Jorge S{\'{a}} Silva and Fernando Boavida and Andr{\'{e}} Rodrigues and Andrew Markham and Rong Zheng}, title = {Wavoice: {A} Noise-resistant Multi-modal Speech Recognition System Fusing mmWave and Audio Signals}, booktitle = {SenSys '21: The 19th {ACM} Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15 - 17, 2021}, pages = {97--110}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485730.3485945}, doi = {10.1145/3485730.3485945}, timestamp = {Thu, 24 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sensys/0002G0WBHX021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/BaZQYLLLR20, author = {Zhongjie Ba and Tianhang Zheng and Zhan Qin and Hanlin Yu and Liu Liu and Baochun Li and Xue Liu and Kui Ren}, title = {Accelerometer-based smartphone eavesdropping}, booktitle = {MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, London, United Kingdom, September 21-25, 2020}, pages = {73:1--73:2}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372224.3417323}, doi = {10.1145/3372224.3417323}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobicom/BaZQYLLLR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BaZZQLL020, author = {Zhongjie Ba and Tianhang Zheng and Xinyu Zhang and Zhan Qin and Baochun Li and Xue Liu and Kui Ren}, title = {Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/learning-based-practical-smartphone-eavesdropping-with-built-in-accelerometer/}, timestamp = {Tue, 15 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/BaZZQLL020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BaQFR19, author = {Zhongjie Ba and Zhan Qin and Xinwen Fu and Kui Ren}, title = {{CIM:} Camera in Motion for Smartphone Authentication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {11}, pages = {2987--3002}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2019.2911173}, doi = {10.1109/TIFS.2019.2911173}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/BaQFR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/RenQB19, author = {Kui Ren and Zhan Qin and Zhongjie Ba}, title = {Toward Hardware-Rooted Smartphone Authentication}, journal = {{IEEE} Wirel. Commun.}, volume = {26}, number = {1}, pages = {114--119}, year = {2019}, url = {https://doi.org/10.1109/MWC.2018.1700365}, doi = {10.1109/MWC.2018.1700365}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/RenQB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/BaZQ019, author = {Zhongjie Ba and Xinyu Zhang and Zhan Qin and Kui Ren}, title = {{CFP:} Enabling Camera Fingerprint Concealment for Privacy-Preserving Image Sharing}, booktitle = {39th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2019, Dallas, TX, USA, July 7-10, 2019}, pages = {1094--1105}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICDCS.2019.00112}, doi = {10.1109/ICDCS.2019.00112}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/BaZQ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/PiaoBSKL019, author = {Sixu Piao and Zhongjie Ba and Lu Su and Dimitrios Koutsonikolas and Shi Li and Kui Ren}, title = {Automating {CSI} Measurement with UAVs: from Problem Formulation to Energy-Optimal Solution}, booktitle = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019, Paris, France, April 29 - May 2, 2019}, pages = {2404--2412}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/INFOCOM.2019.8737613}, doi = {10.1109/INFOCOM.2019.8737613}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/PiaoBSKL019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BaPFKM018, author = {Zhongjie Ba and Sixu Piao and Xinwen Fu and Dimitrios Koutsonikolas and Aziz Mohaisen and Kui Ren}, title = {{ABC:} Enabling Smartphone Authentication with Built-in Camera}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_03B-3\_Ba\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/BaPFKM018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/BaR17, author = {Zhongjie Ba and Kui Ren}, editor = {Kisung Lee and Ling Liu}, title = {Addressing Smartphone-Based Multi-factor Authentication via Hardware-Rooted Technologies}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {1910--1914}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCS.2017.88}, doi = {10.1109/ICDCS.2017.88}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/BaR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pac/BaP017, author = {Zhongjie Ba and Sixu Piao and Kui Ren}, title = {Defending against Speaker Fingerprinting Based Device Tracking for Smartphones}, booktitle = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington, DC, USA, August 1-4, 2017}, pages = {188--189}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.16}, doi = {10.1109/PAC.2017.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pac/BaP017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhaoBWZHT16, author = {Gansen Zhao and Zhongjie Ba and Xinming Wang and Feng Zhang and Changqin Huang and Yong Tang}, title = {Constructing authentication web in cloud computing}, journal = {Secur. Commun. Networks}, volume = {9}, number = {15}, pages = {2843--2860}, year = {2016}, url = {https://doi.org/10.1002/sec.1202}, doi = {10.1002/SEC.1202}, timestamp = {Tue, 11 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ZhaoBWZHT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SongLBRZX16, author = {Chen Song and Feng Lin and Zhongjie Ba and Kui Ren and Chi Zhou and Wenyao Xu}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {895--907}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978300}, doi = {10.1145/2976749.2978300}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SongLBRZX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdwm/ZhaoBDWLRH15, author = {Gansen Zhao and Zhongjie Ba and Jiahua Du and Xinming Wang and Ziliu Li and Chunming Rong and Changqin Huang}, title = {Resource Constrained Data Stream Clustering with Concept Drifting for Processing Sensor Data}, journal = {Int. J. Data Warehous. Min.}, volume = {11}, number = {3}, pages = {49--67}, year = {2015}, url = {https://doi.org/10.4018/IJDWM.2015070103}, doi = {10.4018/IJDWM.2015070103}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdwm/ZhaoBDWLRH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcsc/ZhaoBZCLT13, author = {Gansen Zhao and Zhongjie Ba and Feng Zhang and Qi Chen and Jianguo Li and Yong Tang}, title = {Contructing Authentication Web in Cloud Computing}, booktitle = {2013 International Conference on Cloud and Service Computing, {CSC} 2013, Beijing, China, November 4-6, 2013}, pages = {106--111}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CSC.2013.24}, doi = {10.1109/CSC.2013.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcsc/ZhaoBZCLT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEwisa/ZhaoWBWCLT13, author = {Gansen Zhao and Haiyu Wang and Zhongjie Ba and Yangyang Wu and Qi Chen and Jianguo Li and Yong Tang}, title = {On the Construction of Trusted Resource Pool in Clouds}, booktitle = {2013 10th Web Information System and Application Conference, Yangzhou, China, November 10-15, 2013}, pages = {373--376}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/WISA.2013.77}, doi = {10.1109/WISA.2013.77}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEwisa/ZhaoWBWCLT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.