BibTeX records: Zhongjie Ba

download as .bib file

@article{DBLP:journals/tdsc/ChengWHBLLR24,
  author       = {Peng Cheng and
                  Yuexin Wu and
                  Yuan Hong and
                  Zhongjie Ba and
                  Feng Lin and
                  Li Lu and
                  Kui Ren},
  title        = {UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial
                  Perturbations},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {31--46},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3242292},
  doi          = {10.1109/TDSC.2023.3242292},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChengWHBLLR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShenLWLBLXR24,
  author       = {Yijie Shen and
                  Feng Lin and
                  Chao Wang and
                  Tiantian Liu and
                  Zhongjie Ba and
                  Li Lu and
                  Wenyao Xu and
                  Kui Ren},
  title        = {MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous
                  Signals Learning},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {372--387},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3253507},
  doi          = {10.1109/TDSC.2023.3253507},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ShenLWLBLXR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenLYBLR24,
  author       = {Meng Chen and
                  Li Lu and
                  Jiadi Yu and
                  Zhongjie Ba and
                  Feng Lin and
                  Kui Ren},
  title        = {AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples
                  to Human Perception},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {1948--1962},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3345639},
  doi          = {10.1109/TIFS.2023.3345639},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenLYBLR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/BaLLWLL024,
  author       = {Zhongjie Ba and
                  Qingyu Liu and
                  Zhenguang Liu and
                  Shuang Wu and
                  Feng Lin and
                  Li Lu and
                  Kui Ren},
  editor       = {Michael J. Wooldridge and
                  Jennifer G. Dy and
                  Sriraam Natarajan},
  title        = {Exposing the Deception: Uncovering More Forgery Clues for Deepfake
                  Detection},
  booktitle    = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI}
                  2024, Thirty-Sixth Conference on Innovative Applications of Artificial
                  Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances
                  in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver,
                  Canada},
  pages        = {719--728},
  publisher    = {{AAAI} Press},
  year         = {2024},
  url          = {https://doi.org/10.1609/aaai.v38i2.27829},
  doi          = {10.1609/AAAI.V38I2.27829},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/BaLLWLL024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iui/ChenGLXBLL024,
  author       = {Qianniu Chen and
                  Zhehan Gu and
                  Li Lu and
                  Xiangyu Xu and
                  Zhongjie Ba and
                  Feng Lin and
                  Zhenguang Liu and
                  Kui Ren},
  title        = {Conan's Bow Tie: {A} Streaming Voice Conversion for Real-Time VTuber
                  Livestreaming},
  booktitle    = {Proceedings of the 29th International Conference on Intelligent User
                  Interfaces, {IUI} 2024, Greenville, SC, USA, March 18-21, 2024},
  pages        = {35--50},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3640543.3645146},
  doi          = {10.1145/3640543.3645146},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iui/ChenGLXBLL024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-15704,
  author       = {Peng Huang and
                  Yao Wei and
                  Peng Cheng and
                  Zhongjie Ba and
                  Li Lu and
                  Feng Lin and
                  Yang Wang and
                  Kui Ren},
  title        = {Phoneme-Based Proactive Anti-Eavesdropping with Controlled Recording
                  Privilege},
  journal      = {CoRR},
  volume       = {abs/2401.15704},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.15704},
  doi          = {10.48550/ARXIV.2401.15704},
  eprinttype    = {arXiv},
  eprint       = {2401.15704},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-15704.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-01786,
  author       = {Zhongjie Ba and
                  Qingyu Liu and
                  Zhenguang Liu and
                  Shuang Wu and
                  Feng Lin and
                  Li Lu and
                  Kui Ren},
  title        = {Exposing the Deception: Uncovering More Forgery Clues for Deepfake
                  Detection},
  journal      = {CoRR},
  volume       = {abs/2403.01786},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.01786},
  doi          = {10.48550/ARXIV.2403.01786},
  eprinttype    = {arXiv},
  eprint       = {2403.01786},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-01786.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imwut/WangCLBLR23,
  author       = {Lei Wang and
                  Meng Chen and
                  Li Lu and
                  Zhongjie Ba and
                  Feng Lin and
                  Kui Ren},
  title        = {VoiceListener: {A} Training-free and Universal Eavesdropping Attack
                  on Built-in Speakers of Mobile Devices},
  journal      = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.},
  volume       = {7},
  number       = {1},
  pages        = {32:1--32:22},
  year         = {2023},
  url          = {https://doi.org/10.1145/3580789},
  doi          = {10.1145/3580789},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imwut/WangCLBLR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imwut/Chen0WY00B0023,
  author       = {Meng Chen and
                  Li Lu and
                  Junhao Wang and
                  Jiadi Yu and
                  Yingying Chen and
                  Zhibo Wang and
                  Zhongjie Ba and
                  Feng Lin and
                  Kui Ren},
  title        = {VoiceCloak: Adversarial Example Enabled Voice De-Identification with
                  Balanced Privacy and Utility},
  journal      = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.},
  volume       = {7},
  number       = {2},
  pages        = {48:1--48:21},
  year         = {2023},
  url          = {https://doi.org/10.1145/3596266},
  doi          = {10.1145/3596266},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imwut/Chen0WY00B0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GaoLCLBXHR23,
  author       = {Ming Gao and
                  Yajie Liu and
                  Yike Chen and
                  Yimin Li and
                  Zhongjie Ba and
                  Xian Xu and
                  Jinsong Han and
                  Kui Ren},
  title        = {Device-Independent Smartphone Eavesdropping Jointly Using Accelerometer
                  and Gyroscope},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {4},
  pages        = {3144--3157},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3193130},
  doi          = {10.1109/TDSC.2022.3193130},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GaoLCLBXHR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangZCGBXCR23,
  author       = {Wenyuan Yang and
                  Xiaoyu Zhou and
                  Zhikai Chen and
                  Bofei Guo and
                  Zhongjie Ba and
                  Zhihua Xia and
                  Xiaochun Cao and
                  Kui Ren},
  title        = {AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {2015--2029},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3262148},
  doi          = {10.1109/TIFS.2023.3262148},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangZCGBXCR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuFCWBLL023,
  author       = {Liu Liu and
                  Xinwen Fu and
                  Xiaodong Chen and
                  Jianpeng Wang and
                  Zhongjie Ba and
                  Feng Lin and
                  Li Lu and
                  Kui Ren},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {{FITS:} Matching Camera Fingerprints Subject to Software Noise Pollution},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {1660--1674},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3616600},
  doi          = {10.1145/3576915.3616600},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuFCWBLL023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/WangLBLR23,
  author       = {Junhao Wang and
                  Li Lu and
                  Zhongjie Ba and
                  Feng Lin and
                  Kui Ren},
  title        = {Shift to Your Device: Data Augmentation for Device-Independent Speaker
                  Verification Anti-Spoofing},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing
                  {ICASSP} 2023, Rhodes Island, Greece, June 4-10, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICASSP49357.2023.10097168},
  doi          = {10.1109/ICASSP49357.2023.10097168},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icassp/WangLBLR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccv/WeiSZVBCMBKM23,
  author       = {Yao Wei and
                  Yanchao Sun and
                  Ruijie Zheng and
                  Sai Vemprala and
                  Rogerio Bonatti and
                  Shuhang Chen and
                  Ratnesh Madaan and
                  Zhongjie Ba and
                  Ashish Kapoor and
                  Shuang Ma},
  title        = {Is Imitation All You Need? Generalized Decision-Making with Dual-Phase
                  Training},
  booktitle    = {{IEEE/CVF} International Conference on Computer Vision, {ICCV} 2023,
                  Paris, France, October 1-6, 2023},
  pages        = {16175--16185},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCV51070.2023.01486},
  doi          = {10.1109/ICCV51070.2023.01486},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccv/WeiSZVBCMBKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/ShuaiZ0LWBLC023,
  author       = {Chao Shuai and
                  Jieming Zhong and
                  Shuang Wu and
                  Feng Lin and
                  Zhibo Wang and
                  Zhongjie Ba and
                  Zhenguang Liu and
                  Lorenzo Cavallaro and
                  Kui Ren},
  editor       = {Abdulmotaleb El{-}Saddik and
                  Tao Mei and
                  Rita Cucchiara and
                  Marco Bertini and
                  Diana Patricia Tobon Vallejo and
                  Pradeep K. Atrey and
                  M. Shamim Hossain},
  title        = {Locate and Verify: {A} Two-Stream Network for Improved Deepfake Detection},
  booktitle    = {Proceedings of the 31st {ACM} International Conference on Multimedia,
                  {MM} 2023, Ottawa, ON, Canada, 29 October 2023- 3 November 2023},
  pages        = {7131--7142},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3581783.3612386},
  doi          = {10.1145/3581783.3612386},
  timestamp    = {Mon, 27 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mm/ShuaiZ0LWBLC023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/PanYW0BL0C023,
  author       = {Kun Pan and
                  Yifang Yin and
                  Yao Wei and
                  Feng Lin and
                  Zhongjie Ba and
                  Zhenguang Liu and
                  Zhibo Wang and
                  Lorenzo Cavallaro and
                  Kui Ren},
  editor       = {Abdulmotaleb El{-}Saddik and
                  Tao Mei and
                  Rita Cucchiara and
                  Marco Bertini and
                  Diana Patricia Tobon Vallejo and
                  Pradeep K. Atrey and
                  M. Shamim Hossain},
  title        = {{DFIL:} Deepfake Incremental Learning by Exploiting Domain-invariant
                  Forgery Clues},
  booktitle    = {Proceedings of the 31st {ACM} International Conference on Multimedia,
                  {MM} 2023, Ottawa, ON, Canada, 29 October 2023- 3 November 2023},
  pages        = {8035--8046},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3581783.3612377},
  doi          = {10.1145/3581783.3612377},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mm/PanYW0BL0C023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HuangWCB000023,
  author       = {Peng Huang and
                  Yao Wei and
                  Peng Cheng and
                  Zhongjie Ba and
                  Li Lu and
                  Feng Lin and
                  Fan Zhang and
                  Kui Ren},
  title        = {InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/infomasker-preventing-eavesdropping-using-phoneme-based-noise/},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/HuangWCB000023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiuLWWBLXR23,
  author       = {Tiantian Liu and
                  Feng Lin and
                  Zhangsen Wang and
                  Chao Wang and
                  Zhongjie Ba and
                  Li Lu and
                  Wenyao Xu and
                  Kui Ren},
  title        = {MagBackdoor: Beware of Your Loudspeaker as {A} Backdoor For Magnetic
                  Injection Attacks},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {3416--3431},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179364},
  doi          = {10.1109/SP46215.2023.10179364},
  timestamp    = {Thu, 24 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LiuLWWBLXR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/BaWCWL0L23,
  author       = {Zhongjie Ba and
                  Qing Wen and
                  Peng Cheng and
                  Yuwei Wang and
                  Feng Lin and
                  Li Lu and
                  Zhenguang Liu},
  editor       = {Ying Ding and
                  Jie Tang and
                  Juan F. Sequeda and
                  Lora Aroyo and
                  Carlos Castillo and
                  Geert{-}Jan Houben},
  title        = {Transferring Audio Deepfake Detection Capability across Languages},
  booktitle    = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin,
                  TX, USA, 30 April 2023 - 4 May 2023},
  pages        = {2033--2044},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3543507.3583222},
  doi          = {10.1145/3543507.3583222},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/BaWCWL0L23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-11363,
  author       = {Jiachen Lei and
                  Peng Cheng and
                  Zhongjie Ba and
                  Kui Ren},
  title        = {Masked Diffusion Models are Fast Learners},
  journal      = {CoRR},
  volume       = {abs/2306.11363},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.11363},
  doi          = {10.48550/ARXIV.2306.11363},
  eprinttype    = {arXiv},
  eprint       = {2306.11363},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-11363.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-07909,
  author       = {Yao Wei and
                  Yanchao Sun and
                  Ruijie Zheng and
                  Sai Vemprala and
                  Rogerio Bonatti and
                  Shuhang Chen and
                  Ratnesh Madaan and
                  Zhongjie Ba and
                  Ashish Kapoor and
                  Shuang Ma},
  title        = {Is Imitation All You Need? Generalized Decision-Making with Dual-Phase
                  Training},
  journal      = {CoRR},
  volume       = {abs/2307.07909},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.07909},
  doi          = {10.48550/ARXIV.2307.07909},
  eprinttype    = {arXiv},
  eprint       = {2307.07909},
  timestamp    = {Tue, 25 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-07909.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-16630,
  author       = {Xinyu Zhang and
                  Hanbin Hong and
                  Yuan Hong and
                  Peng Huang and
                  Binghui Wang and
                  Zhongjie Ba and
                  Kui Ren},
  title        = {Text-CRS: {A} Generalized Certified Robustness Framework against Textual
                  Adversarial Attacks},
  journal      = {CoRR},
  volume       = {abs/2307.16630},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.16630},
  doi          = {10.48550/ARXIV.2307.16630},
  eprinttype    = {arXiv},
  eprint       = {2307.16630},
  timestamp    = {Tue, 15 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-16630.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-09526,
  author       = {Kun Pan and
                  Yifang Yin and
                  Yao Wei and
                  Feng Lin and
                  Zhongjie Ba and
                  Zhenguang Liu and
                  Zhibo Wang and
                  Lorenzo Cavallaro and
                  Kui Ren},
  title        = {{DFIL:} Deepfake Incremental Learning by Exploiting Domain-invariant
                  Forgery Clues},
  journal      = {CoRR},
  volume       = {abs/2309.09526},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.09526},
  doi          = {10.48550/ARXIV.2309.09526},
  eprinttype    = {arXiv},
  eprint       = {2309.09526},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-09526.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-11131,
  author       = {Chao Shuai and
                  Jieming Zhong and
                  Shuang Wu and
                  Feng Lin and
                  Zhibo Wang and
                  Zhongjie Ba and
                  Zhenguang Liu and
                  Lorenzo Cavallaro and
                  Kui Ren},
  title        = {Locate and Verify: {A} Two-Stream Network for Improved Deepfake Detection},
  journal      = {CoRR},
  volume       = {abs/2309.11131},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.11131},
  doi          = {10.48550/ARXIV.2309.11131},
  eprinttype    = {arXiv},
  eprint       = {2309.11131},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-11131.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-14122,
  author       = {Zhongjie Ba and
                  Jieming Zhong and
                  Jiachen Lei and
                  Peng Cheng and
                  Qinglong Wang and
                  Zhan Qin and
                  Zhibo Wang and
                  Kui Ren},
  title        = {SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models
                  via Substitution},
  journal      = {CoRR},
  volume       = {abs/2309.14122},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.14122},
  doi          = {10.48550/ARXIV.2309.14122},
  eprinttype    = {arXiv},
  eprint       = {2309.14122},
  timestamp    = {Wed, 27 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-14122.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-13424,
  author       = {Xinyu Zhang and
                  Qingyu Liu and
                  Zhongjie Ba and
                  Yuan Hong and
                  Tianhang Zheng and
                  Feng Lin and
                  Li Lu and
                  Kui Ren},
  title        = {FLTracer: Accurate Poisoning Attack Provenance in Federated Learning},
  journal      = {CoRR},
  volume       = {abs/2310.13424},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.13424},
  doi          = {10.48550/ARXIV.2310.13424},
  eprinttype    = {arXiv},
  eprint       = {2310.13424},
  timestamp    = {Sat, 02 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-13424.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/ZhangLBTC22,
  author       = {Xiao Zhang and
                  Jiqiang Liu and
                  Zhongjie Ba and
                  Yaodong Tao and
                  Xiaochun Cheng},
  title        = {MobiScan: An enhanced invisible screen-camera communication system
                  for IoT applications},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {33},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/ett.4151},
  doi          = {10.1002/ETT.4151},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/ZhangLBTC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imwut/WangLBZXR22,
  author       = {Chao Wang and
                  Feng Lin and
                  Zhongjie Ba and
                  Fan Zhang and
                  Wenyao Xu and
                  Kui Ren},
  title        = {Wavesdropper: Through-wall Word Detection of Human Speech via Commercial
                  mmWave Devices},
  journal      = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.},
  volume       = {6},
  number       = {2},
  pages        = {77:1--77:26},
  year         = {2022},
  url          = {https://doi.org/10.1145/3534592},
  doi          = {10.1145/3534592},
  timestamp    = {Thu, 24 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imwut/WangLBZXR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imwut/LiuLWSBLXR22,
  author       = {Ziwei Liu and
                  Feng Lin and
                  Chao Wang and
                  Yijie Shen and
                  Zhongjie Ba and
                  Li Lu and
                  Wenyao Xu and
                  Kui Ren},
  title        = {CamRadar: Hidden Camera Detection Leveraging Amplitude-modulated Sensor
                  Images Embedded in Electromagnetic Emanations},
  journal      = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.},
  volume       = {6},
  number       = {4},
  pages        = {173:1--173:25},
  year         = {2022},
  url          = {https://doi.org/10.1145/3569505},
  doi          = {10.1145/3569505},
  timestamp    = {Thu, 24 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imwut/LiuLWSBLXR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuWBZDH22,
  author       = {Bingyu Liu and
                  Rujia Wang and
                  Zhongjie Ba and
                  Shanglin Zhou and
                  Caiwen Ding and
                  Yuan Hong},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Poster: Cryptographic Inferences for Video Deep Neural Networks},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {3395--3397},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3563543},
  doi          = {10.1145/3548606.3563543},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuWBZDH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/LuBLHR22,
  author       = {Li Lu and
                  Zhongjie Ba and
                  Feng Lin and
                  Jinsong Han and
                  Kui Ren},
  title        = {ActListener: Imperceptible Activity Surveillance by Pervasive Wireless
                  Infrastructures},
  booktitle    = {42nd {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2022, Bologna, Italy, July 10-13, 2022},
  pages        = {776--786},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICDCS54860.2022.00080},
  doi          = {10.1109/ICDCS54860.2022.00080},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/LuBLHR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WangLLLSBLXR22,
  author       = {Chao Wang and
                  Feng Lin and
                  Tiantian Liu and
                  Ziwei Liu and
                  Yijie Shen and
                  Zhongjie Ba and
                  Li Lu and
                  Wenyao Xu and
                  Kui Ren},
  title        = {mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized
                  Piezoelectric Effect},
  booktitle    = {{IEEE} {INFOCOM} 2022 - {IEEE} Conference on Computer Communications,
                  London, United Kingdom, May 2-5, 2022},
  pages        = {820--829},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/INFOCOM48880.2022.9796806},
  doi          = {10.1109/INFOCOM48880.2022.9796806},
  timestamp    = {Thu, 24 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/WangLLLSBLXR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/GaoLCLBXH22,
  author       = {Ming Gao and
                  Yajie Liu and
                  Yike Chen and
                  Yimin Li and
                  Zhongjie Ba and
                  Xian Xu and
                  Jinsong Han},
  title        = {InertiEAR: Automatic and Device-independent IMU-based Eavesdropping
                  on Smartphones},
  booktitle    = {{IEEE} {INFOCOM} 2022 - {IEEE} Conference on Computer Communications,
                  London, United Kingdom, May 2-5, 2022},
  pages        = {1129--1138},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/INFOCOM48880.2022.9796890},
  doi          = {10.1109/INFOCOM48880.2022.9796890},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/GaoLCLBXH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ChenLBR22,
  author       = {Meng Chen and
                  Li Lu and
                  Zhongjie Ba and
                  Kui Ren},
  title        = {PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack
                  on Speaker Recognition},
  booktitle    = {{IEEE} {INFOCOM} 2022 - {IEEE} Conference on Computer Communications,
                  London, United Kingdom, May 2-5, 2022},
  pages        = {1419--1428},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/INFOCOM48880.2022.9796934},
  doi          = {10.1109/INFOCOM48880.2022.9796934},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/ChenLBR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/Chen0YCB0022,
  author       = {Meng Chen and
                  Li Lu and
                  Jiadi Yu and
                  Yingying Chen and
                  Zhongjie Ba and
                  Feng Lin and
                  Kui Ren},
  title        = {A non-intrusive and adaptive speaker de-identification scheme using
                  adversarial examples},
  booktitle    = {{ACM} MobiCom '22: The 28th Annual International Conference on Mobile
                  Computing and Networking, Sydney, NSW, Australia, October 17 - 21,
                  2022},
  pages        = {853--855},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3495243.3558260},
  doi          = {10.1145/3495243.3558260},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobicom/Chen0YCB0022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/ChenCLYCWBL022,
  author       = {Qianniu Chen and
                  Meng Chen and
                  Li Lu and
                  Jiadi Yu and
                  Yingying Chen and
                  Zhibo Wang and
                  Zhongjie Ba and
                  Feng Lin and
                  Kui Ren},
  editor       = {Jeremy Gummeson and
                  Sunghoon Ivan Lee and
                  Jie Gao and
                  Guoliang Xing},
  title        = {Push the Limit of Adversarial Example Attack on Speaker Recognition
                  in Physical Domain},
  booktitle    = {Proceedings of the 20th {ACM} Conference on Embedded Networked Sensor
                  Systems, SenSys 2022, Boston, Massachusetts, November 6-9, 2022},
  pages        = {710--724},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560905.3568518},
  doi          = {10.1145/3560905.3568518},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sensys/ChenCLYCWBL022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-05446,
  author       = {Meng Chen and
                  Li Lu and
                  Jiadi Yu and
                  Yingying Chen and
                  Zhongjie Ba and
                  Feng Lin and
                  Kui Ren},
  title        = {Privacy-Utility Balanced Voice De-Identification Using Adversarial
                  Examples},
  journal      = {CoRR},
  volume       = {abs/2211.05446},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.05446},
  doi          = {10.48550/ARXIV.2211.05446},
  eprinttype    = {arXiv},
  eprint       = {2211.05446},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-05446.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-15286,
  author       = {Jiachen Lei and
                  Shuang Ma and
                  Zhongjie Ba and
                  Sai Vemprala and
                  Ashish Kapoor and
                  Kui Ren},
  title        = {Masked Autoencoders for Egocentric Video Understanding @ Ego4D Challenge
                  2022},
  journal      = {CoRR},
  volume       = {abs/2211.15286},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.15286},
  doi          = {10.48550/ARXIV.2211.15286},
  eprinttype    = {arXiv},
  eprint       = {2211.15286},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-15286.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangZLSB21,
  author       = {Qian Wang and
                  Baolin Zheng and
                  Qi Li and
                  Chao Shen and
                  Zhongjie Ba},
  title        = {Towards Query-Efficient Adversarial Attacks Against Automatic Speech
                  Recognition Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {896--908},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2020.3026543},
  doi          = {10.1109/TIFS.2020.3026543},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangZLSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LiuYBLL021,
  author       = {Liu Liu and
                  Hanlin Yu and
                  Zhongjie Ba and
                  Li Lu and
                  Feng Lin and
                  Kui Ren},
  title        = {PassFace: Enabling Practical Anti-Spoofing Facial Recognition with
                  Camera Fingerprinting},
  booktitle    = {{ICC} 2021 - {IEEE} International Conference on Communications, Montreal,
                  QC, Canada, June 14-23, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICC42927.2021.9501053},
  doi          = {10.1109/ICC42927.2021.9501053},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/LiuYBLL021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/0002G0WBHX021,
  author       = {Tiantian Liu and
                  Ming Gao and
                  Feng Lin and
                  Chao Wang and
                  Zhongjie Ba and
                  Jinsong Han and
                  Wenyao Xu and
                  Kui Ren},
  editor       = {Jorge S{\'{a}} Silva and
                  Fernando Boavida and
                  Andr{\'{e}} Rodrigues and
                  Andrew Markham and
                  Rong Zheng},
  title        = {Wavoice: {A} Noise-resistant Multi-modal Speech Recognition System
                  Fusing mmWave and Audio Signals},
  booktitle    = {SenSys '21: The 19th {ACM} Conference on Embedded Networked Sensor
                  Systems, Coimbra, Portugal, November 15 - 17, 2021},
  pages        = {97--110},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485730.3485945},
  doi          = {10.1145/3485730.3485945},
  timestamp    = {Thu, 24 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sensys/0002G0WBHX021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/BaZQYLLLR20,
  author       = {Zhongjie Ba and
                  Tianhang Zheng and
                  Zhan Qin and
                  Hanlin Yu and
                  Liu Liu and
                  Baochun Li and
                  Xue Liu and
                  Kui Ren},
  title        = {Accelerometer-based smartphone eavesdropping},
  booktitle    = {MobiCom '20: The 26th Annual International Conference on Mobile Computing
                  and Networking, London, United Kingdom, September 21-25, 2020},
  pages        = {73:1--73:2},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372224.3417323},
  doi          = {10.1145/3372224.3417323},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobicom/BaZQYLLLR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BaZZQLL020,
  author       = {Zhongjie Ba and
                  Tianhang Zheng and
                  Xinyu Zhang and
                  Zhan Qin and
                  Baochun Li and
                  Xue Liu and
                  Kui Ren},
  title        = {Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/learning-based-practical-smartphone-eavesdropping-with-built-in-accelerometer/},
  timestamp    = {Tue, 15 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/BaZZQLL020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/BaQFR19,
  author       = {Zhongjie Ba and
                  Zhan Qin and
                  Xinwen Fu and
                  Kui Ren},
  title        = {{CIM:} Camera in Motion for Smartphone Authentication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {11},
  pages        = {2987--3002},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2019.2911173},
  doi          = {10.1109/TIFS.2019.2911173},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/BaQFR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/RenQB19,
  author       = {Kui Ren and
                  Zhan Qin and
                  Zhongjie Ba},
  title        = {Toward Hardware-Rooted Smartphone Authentication},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {26},
  number       = {1},
  pages        = {114--119},
  year         = {2019},
  url          = {https://doi.org/10.1109/MWC.2018.1700365},
  doi          = {10.1109/MWC.2018.1700365},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/RenQB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/BaZQ019,
  author       = {Zhongjie Ba and
                  Xinyu Zhang and
                  Zhan Qin and
                  Kui Ren},
  title        = {{CFP:} Enabling Camera Fingerprint Concealment for Privacy-Preserving
                  Image Sharing},
  booktitle    = {39th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2019, Dallas, TX, USA, July 7-10, 2019},
  pages        = {1094--1105},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICDCS.2019.00112},
  doi          = {10.1109/ICDCS.2019.00112},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/BaZQ019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/PiaoBSKL019,
  author       = {Sixu Piao and
                  Zhongjie Ba and
                  Lu Su and
                  Dimitrios Koutsonikolas and
                  Shi Li and
                  Kui Ren},
  title        = {Automating {CSI} Measurement with UAVs: from Problem Formulation to
                  Energy-Optimal Solution},
  booktitle    = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019,
                  Paris, France, April 29 - May 2, 2019},
  pages        = {2404--2412},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/INFOCOM.2019.8737613},
  doi          = {10.1109/INFOCOM.2019.8737613},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/PiaoBSKL019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BaPFKM018,
  author       = {Zhongjie Ba and
                  Sixu Piao and
                  Xinwen Fu and
                  Dimitrios Koutsonikolas and
                  Aziz Mohaisen and
                  Kui Ren},
  title        = {{ABC:} Enabling Smartphone Authentication with Built-in Camera},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_03B-3\_Ba\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/BaPFKM018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/BaR17,
  author       = {Zhongjie Ba and
                  Kui Ren},
  editor       = {Kisung Lee and
                  Ling Liu},
  title        = {Addressing Smartphone-Based Multi-factor Authentication via Hardware-Rooted
                  Technologies},
  booktitle    = {37th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages        = {1910--1914},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDCS.2017.88},
  doi          = {10.1109/ICDCS.2017.88},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/BaR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pac/BaP017,
  author       = {Zhongjie Ba and
                  Sixu Piao and
                  Kui Ren},
  title        = {Defending against Speaker Fingerprinting Based Device Tracking for
                  Smartphones},
  booktitle    = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington,
                  DC, USA, August 1-4, 2017},
  pages        = {188--189},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.16},
  doi          = {10.1109/PAC.2017.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pac/BaP017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhaoBWZHT16,
  author       = {Gansen Zhao and
                  Zhongjie Ba and
                  Xinming Wang and
                  Feng Zhang and
                  Changqin Huang and
                  Yong Tang},
  title        = {Constructing authentication web in cloud computing},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {15},
  pages        = {2843--2860},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1202},
  doi          = {10.1002/SEC.1202},
  timestamp    = {Tue, 11 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ZhaoBWZHT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SongLBRZX16,
  author       = {Chen Song and
                  Feng Lin and
                  Zhongjie Ba and
                  Kui Ren and
                  Chi Zhou and
                  Wenyao Xu},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel
                  Attacks Against 3D Printers},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {895--907},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978300},
  doi          = {10.1145/2976749.2978300},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SongLBRZX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdwm/ZhaoBDWLRH15,
  author       = {Gansen Zhao and
                  Zhongjie Ba and
                  Jiahua Du and
                  Xinming Wang and
                  Ziliu Li and
                  Chunming Rong and
                  Changqin Huang},
  title        = {Resource Constrained Data Stream Clustering with Concept Drifting
                  for Processing Sensor Data},
  journal      = {Int. J. Data Warehous. Min.},
  volume       = {11},
  number       = {3},
  pages        = {49--67},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJDWM.2015070103},
  doi          = {10.4018/IJDWM.2015070103},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdwm/ZhaoBDWLRH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcsc/ZhaoBZCLT13,
  author       = {Gansen Zhao and
                  Zhongjie Ba and
                  Feng Zhang and
                  Qi Chen and
                  Jianguo Li and
                  Yong Tang},
  title        = {Contructing Authentication Web in Cloud Computing},
  booktitle    = {2013 International Conference on Cloud and Service Computing, {CSC}
                  2013, Beijing, China, November 4-6, 2013},
  pages        = {106--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CSC.2013.24},
  doi          = {10.1109/CSC.2013.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcsc/ZhaoBZCLT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEwisa/ZhaoWBWCLT13,
  author       = {Gansen Zhao and
                  Haiyu Wang and
                  Zhongjie Ba and
                  Yangyang Wu and
                  Qi Chen and
                  Jianguo Li and
                  Yong Tang},
  title        = {On the Construction of Trusted Resource Pool in Clouds},
  booktitle    = {2013 10th Web Information System and Application Conference, Yangzhou,
                  China, November 10-15, 2013},
  pages        = {373--376},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/WISA.2013.77},
  doi          = {10.1109/WISA.2013.77},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEwisa/ZhaoWBWCLT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics