default search action
Cong Shi 0004
Person information
- affiliation: Rutgers University, New Brunswick, NJ, USA
- affiliation: Stevens Institute of Technology, NJ, USA
Other persons with the same name
- Cong Shi — disambiguation page
- Cong Shi 0001 — University of Michigan, Ann Arbor, MI, USA
- Cong Shi 0002 — Beijing University of Posts and Telecommunications, MOE, Key Laboratory of Universal Wireless Communications, China
- Cong Shi 0003 — Chongqing University, School of Microelectronics and Communication Engineerin, China (and 3 more)
- Cong Shi 0005 — Georg-August-Universität Göttingen, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c32]Tianfang Zhang, Huy Phan, Zijie Tang, Cong Shi, Yan Wang, Bo Yuan, Yingying Chen:
Inaudible Backdoor Attack via Stealthy Frequency Trigger Injection in Audio Spectrogram. MobiCom 2024: 31-45 - [c31]Changming Li, Mingjing Xu, Yicong Du, Limin Liu, Cong Shi, Yan Wang, Hongbo Liu, Yingying Chen:
Practical Adversarial Attack on WiFi Sensing Through Unnoticeable Communication Packet Perturbation. MobiCom 2024: 373-387 - [i7]Yang Sui, Huy Phan, Jinqi Xiao, Tianfang Zhang, Zijie Tang, Cong Shi, Yan Wang, Yingying Chen, Bo Yuan:
DisDet: Exploring Detectability of Backdoor Attack on Diffusion Models. CoRR abs/2402.02739 (2024) - 2023
- [c30]Cong Shi, Tianfang Zhang, Zhaoyi Xu, Shuping Li, Donglin Gao, Changming Li, Athina P. Petropulu, Chung-Tse Michael Wu, Yingying Chen:
Privacy Leakage via Speech-induced Vibrations on Room Objects through Remote Sensing based on Phased-MIMO. CCS 2023: 75-89 - [c29]Tianfang Zhang, Zhengkun Ye, Ahmed Tanvir Mahdad, Md Mojibur Rahman Redoy Akanda, Cong Shi, Yan Wang, Nitesh Saxena, Yingying Chen:
FaceReader: Unobtrusively Mining Vital Signs and Vital Sign Embedded Sensitive Info via AR/VR Motion Sensors. CCS 2023: 446-459 - [c28]Tianming Zhao, Zijie Tang, Tianfang Zhang, Huy Phan, Yan Wang, Cong Shi, Bo Yuan, Yingying Chen:
Stealthy Backdoor Attack on RF Signal Classification. ICCCN 2023: 1-10 - [c27]Ahmed Tanvir Mahdad, Cong Shi, Zhengkun Ye, Tianming Zhao, Yan Wang, Yingying Chen, Nitesh Saxena:
EmoLeak: Smartphone Motions Reveal Emotions. ICDCS 2023: 316-326 - [c26]Cong Shi, Tianfang Zhang, Zhaoyi Xu, Shuping Li, Donglin Gao, Changming Li, Athina P. Petropulu, Chung-Tse Michael Wu, Yingying Chen:
Poster: Extracting Speech from Subtle Room Object Vibrations Using Remote mmWave Sensing. MobiHoc 2023: 306-307 - [c25]Tianfang Zhang, Zhengkun Ye, Ahmed Tanvir Mahdad, Md Mojibur Rahman Redoy Akanda, Cong Shi, Nitesh Saxena, Yan Wang, Yingying Chen:
Poster: Unobtrusively Mining Vital Sign and Embedded Sensitive Info via AR/VR Motion Sensors. MobiHoc 2023: 308-309 - [c24]Tianfang Zhang, Cong Shi, Payton Walker, Zhengkun Ye, Yan Wang, Nitesh Saxena, Yingying Chen:
Passive Vital Sign Monitoring via Facial Vibrations Leveraging AR/VR Headsets. MobiSys 2023: 96-109 - [c23]Yi Wu, Cong Shi, Tianfang Zhang, Payton Walker, Jian Liu, Nitesh Saxena, Yingying Chen:
Privacy Leakage via Unrestricted Motion-Position Sensors in the Age of Virtual Reality: A Study of Snooping Typed Input on Virtual Keyboards. SP 2023: 3382-3398 - [c22]Payton Walker, Tianfang Zhang, Cong Shi, Nitesh Saxena, Yingying Chen:
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers. WISEC 2023: 203-214 - [i6]Payton Walker, Tianfang Zhang, Cong Shi, Nitesh Saxena, Yingying Chen:
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers. CoRR abs/2302.02042 (2023) - 2022
- [j5]Hongbo Liu, Cong Shi, Yingying Chen:
Enabling Secret Key Distribution Over Screen-to-Camera Channel Leveraging Color Shift Property. IEEE Trans. Mob. Comput. 21(10): 3581-3594 (2022) - [c21]Huy Phan, Cong Shi, Yi Xie, Tianfang Zhang, Zhuohang Li, Tianming Zhao, Jian Liu, Yan Wang, Yingying Chen, Bo Yuan:
RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNN. ECCV (4) 2022: 708-724 - [c20]Cong Shi, Tianming Zhao, Wenjin Zhang, Ahmed Tanvir Mahdad, Zhengkun Ye, Yan Wang, Nitesh Saxena, Yingying Chen:
Defending against Thru-barrier Stealthy Voice Attacks via Cross-Domain Sensing on Phoneme Sounds. ICDCS 2022: 680-690 - [c19]Cong Shi, Tianfang Zhang, Zhuohang Li, Huy Phan, Tianming Zhao, Yan Wang, Jian Liu, Bo Yuan, Yingying Chen:
Audio-domain position-independent backdoor attack via unnoticeable triggers. MobiCom 2022: 583-595 - [c18]Tianfang Zhang, Cong Shi, Tianming Zhao, Zhengkun Ye, Payton Walker, Nitesh Saxena, Yan Wang, Yingying Chen:
Personalized health monitoring via vital sign measurements leveraging motion sensors on AR/VR headsets. MobiSys 2022: 529-530 - [c17]Cong Shi, Tianfang Zhang, Zhaoyi Xu, Shuping Li, Yichao Yuan, Athina P. Petropulu, Chung-Tse Michael Wu, Yingying Chen:
Speech privacy attack via vibrations from room objects leveraging a phased-MIMO radar. MobiSys 2022: 573-574 - [c16]Tianming Zhao, Zhengkun Ye, Tianfang Zhang, Cong Shi, Ahmed Tanvir Mahdad, Yan Wang, Yingying Chen, Nitesh Saxena:
Continuous blood pressure monitoring using low-cost motion sensors on AR/VR headsets. MobiSys 2022: 589-590 - [c15]Kailong Wang, Cong Shi, Jerry Cheng, Yan Wang, Minge Xie, Yingying Chen:
Solving the WiFi Sensing Dilemma in Reality Leveraging Conformal Prediction. SenSys 2022: 407-420 - [i5]Huy Phan, Cong Shi, Yi Xie, Tianfang Zhang, Zhuohang Li, Tianming Zhao, Jian Liu, Yan Wang, Yingying Chen, Bo Yuan:
RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNN. CoRR abs/2208.10608 (2022) - [i4]Ahmed Tanvir Mahdad, Cong Shi, Zhengkun Ye, Tianming Zhao, Yan Wang, Yingying Chen, Nitesh Saxena:
EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers. CoRR abs/2212.12151 (2022) - 2021
- [j4]Cong Shi, Yan Wang, Yingying (Jennifer) Chen, Nitesh Saxena:
Authentication of Voice Commands by Leveraging Vibrations in Wearables. IEEE Secur. Priv. 19(6): 83-92 (2021) - [j3]Cong Shi, Jian Liu, Hongbo Liu, Yingying Chen:
WiFi-Enabled User Authentication through Deep Learning in Daily Activities. ACM Trans. Internet Things 2(2): 13:1-13:25 (2021) - [j2]Yi Xie, Zhuohang Li, Cong Shi, Jian Liu, Yingying Chen, Bo Yuan:
Real-time, Robust and Adaptive Universal Adversarial Attacks Against Speaker Recognition Systems. J. Signal Process. Syst. 93(10): 1187-1200 (2021) - [c14]Yi Xie, Zhuohang Li, Cong Shi, Jian Liu, Yingying Chen, Bo Yuan:
Enabling Fast and Universal Audio Adversarial Attack Using Generative Model. AAAI 2021: 14129-14137 - [c13]Zhuohang Li, Cong Shi, Tianfang Zhang, Yi Xie, Jian Liu, Bo Yuan, Yingying Chen:
Robust Detection of Machine-induced Audio Attacks in Intelligent Audio Systems with Microphone Array. CCS 2021: 1884-1899 - [c12]Cong Shi, Tianming Zhao, Yucheng Xie, Tianfang Zhang, Yan Wang, Xiaonan Guo, Yingying Chen:
Environment-independent In-baggage Object Identification Using WiFi Signals. MASS 2021: 71-79 - [c11]Cong Shi, Xiangyu Xu, Tianfang Zhang, Payton Walker, Yi Wu, Jian Liu, Nitesh Saxena, Yingying Chen, Jiadi Yu:
Face-Mic: inferring live speech and speaker identity via subtle facial dynamics captured by AR/VR motion sensors. MobiCom 2021: 478-490 - 2020
- [c10]Cong Shi, Yan Wang, Yingying Chen, Nitesh Saxena, Chen Wang:
WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training. ACSAC 2020: 829-842 - [c9]Yi Xie, Cong Shi, Zhuohang Li, Jian Liu, Yingying Chen, Bo Yuan:
Real-Time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems. ICASSP 2020: 1738-1742 - [c8]Cong Shi, Xiaonan Guo, Ting Yu, Yingying Chen, Yucheng Xie, Jian Liu:
Mobile Device Usage Recommendation based on User Context Inference Using Embedded Sensors. ICCCN 2020: 1-9 - [c7]Cong Shi, Jian Liu, Nick Borodinov, Bruno Leão, Yingying Chen:
Towards Environment-independent Behavior-based User Authentication Using WiFi. MASS 2020: 666-674 - [c6]Zhuohang Li, Cong Shi, Yi Xie, Jian Liu, Bo Yuan, Yingying Chen:
Practical Adversarial Attacks Against Speaker Recognition Systems. HotMobile 2020: 9-14 - [i3]Yi Xie, Cong Shi, Zhuohang Li, Jian Liu, Yingying Chen, Bo Yuan:
Real-time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems. CoRR abs/2003.02301 (2020) - [i2]Chen Wang, Cong Shi, Yingying Chen, Yan Wang, Nitesh Saxena:
WearID: Wearable-Assisted Low-Effort Authentication to Voice Assistants using Cross-Domain Speech Similarity. CoRR abs/2003.09083 (2020) - [i1]Yi Xie, Zhuohang Li, Cong Shi, Jian Liu, Yingying Chen, Bo Yuan:
Enabling Fast and Universal Audio Adversarial Attack Using Generative Model. CoRR abs/2004.12261 (2020)
2010 – 2019
- 2019
- [c5]Cong Shi, Justin Esposito, Sachin Mathew, Amit Patel, Rishika Sakhuja, Jian Liu, Yingying Chen:
Demo: Device-free Activity Monitoring Through Real-time Analysis on Prevalent WiFi Signals. DySPAN 2019: 1-2 - [c4]Jian Liu, Cong Shi, Yingying Chen, Hongbo Liu, Marco Gruteser:
CardioCam: Leveraging Camera on Mobile Devices to Verify Users While Their Heart is Pumping. MobiSys 2019: 249-261 - 2018
- [j1]Xiaonan Guo, Jian Liu, Cong Shi, Hongbo Liu, Yingying Chen, Mooi Choo Chuah:
Device-free Personalized Fitness Assistant Using WiFi. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(4): 165:1-165:23 (2018) - 2017
- [c3]Hongbo Liu, Bo Liu, Cong Shi, Yingying Chen:
Secret key distribution leveraging color shift over visible light channel. CNS 2017: 1-9 - [c2]Cong Shi, Jian Liu, Hongbo Liu, Yingying Chen:
Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT. MobiHoc 2017: 5:1-5:10 - [c1]Xiaonan Guo, Bo Liu, Cong Shi, Hongbo Liu, Yingying Chen, Mooi Choo Chuah:
WiFi-Enabled Smart Human Dynamics Monitoring. SenSys 2017: 16:1-16:13
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint