default search action
Yushi Cheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j12]Xinfeng Li, Junning Ze, Chen Yan, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
Enrollment-Stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound. IEEE Internet Things J. 11(8): 13108-13124 (2024) - [j11]Ruiwen He, Yushi Cheng, Zhicong Zheng, Xiaoyu Ji, Wenyuan Xu:
Fast and Lightweight Voice Replay Attack Detection via Time-Frequency Spectrum Difference. IEEE Internet Things J. 11(18): 29798-29810 (2024) - [j10]Wenyuan Xu, Yushi Cheng, Xiaoyu Ji, Yi-Chao Chen:
On Tracing Screen Photos - A Moiré Pattern-Based Approach. IEEE Trans. Dependable Secur. Comput. 21(4): 2068-2084 (2024) - [j9]Yushi Cheng, Xiaoyu Ji, Wenjun Zhu, Shibo Zhang, Kevin Fu, Wenyuan Xu:
Adversarial Computer Vision via Acoustic Manipulation of Camera Sensors. IEEE Trans. Dependable Secur. Comput. 21(4): 3734-3750 (2024) - [j8]Yushi Cheng, Boyang Zhou, Yanjiao Chen, Yi-Chao Chen, Xiaoyu Ji, Wenyuan Xu:
Evaluating Compressive Sensing on the Security of Computer Vision Systems. ACM Trans. Sens. Networks 20(3): 56:1-56:24 (2024) - 2023
- [j7]Xiaoyu Ji, Yushi Cheng, Wenyuan Xu, Yuehan Chi, Hao Pan, Zhuangdi Zhu, Chuang-Wen You, Yi-Chao Chen, Lili Qiu:
No Seeing is Also Believing: Electromagnetic-Emission-Based Application Guessing Attacks via Smartphones. IEEE Trans. Mob. Comput. 22(2): 1095-1109 (2023) - [j6]Yanjiao Chen, Yushi Cheng, Xiaoyu Ji, Boyang Zhou, Wenyuan Xu, Fei Teng:
PDGes: An Interpretable Detection Model for Parkinson's Disease Using Smartphones. ACM Trans. Sens. Networks 19(4): 77:1-77:21 (2023) - 2022
- [j5]Xiaoyu Ji, Yushi Cheng, Juchuan Zhang, Yuehan Chi, Wenyuan Xu, Yi-Chao Chen:
Device Fingerprinting with Magnetic Induction Signals Radiated by CPU Modules. ACM Trans. Sens. Networks 18(2): 23:1-23:28 (2022) - 2020
- [j4]Yushi Cheng, Xiaoyu Ji, Tianyang Lu, Wenyuan Xu:
On Detecting Hidden Wireless Cameras: A Traffic Pattern-based Approach. IEEE Trans. Mob. Comput. 19(4): 907-921 (2020) - [j3]Yushi Cheng, Xiaoyu Ji, Xiaopeng Li, Tianchen Zhang, Sharaf J. Malebary, Xianshan Qu, Wenyuan Xu:
Identifying Child Users via Touchscreen Interactions. ACM Trans. Sens. Networks 16(4): 35:1-35:25 (2020) - 2018
- [j2]Xiaoyu Ji, Yushi Cheng, Wenyuan Xu, Xinyan Zhou:
User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes. Secur. Commun. Networks 2018: 3980371:1-3980371:10 (2018) - [j1]Xinyan Zhou, Xiaoyu Ji, Bin Wang, Yushi Cheng, Zhuoran Ma, Francis Choi, Brian Helmuth, Wenyuan Xu:
Pido: Predictive Delay Optimization for Intertidal Wireless Sensor Networks. Sensors 18(5): 1464 (2018)
Conference and Workshop Papers
- 2024
- [c22]Zhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji, Wenyuan Xu:
UniID: Spoofing Face Authentication System by Universal Identity. NDSS 2024 - [c21]Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
CamPro: Camera-based Anti-Facial Recognition. NDSS 2024 - [c20]Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu:
Understanding and Benchmarking the Commonality of Adversarial Examples. SP 2024: 1665-1683 - [c19]Zizhi Jin, Xuancun Lu, Bo Yang, Yushi Cheng, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
Unity is Strength? Benchmarking the Robustness of Fusion-based 3D Object Detection against Physical Sensor Attack. WWW 2024: 3031-3042 - 2023
- [c18]Zhihao Wu, Yushi Cheng, Jiahui Yang, Xiaoyu Ji, Wenyuan Xu:
DepthFake: Spoofing 3D Face Authentication with a 2D Photo. SP 2023: 917-91373 - [c17]Zizhi Jin, Xiaoyu Ji, Yushi Cheng, Bo Yang, Chen Yan, Wenyuan Xu:
PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle. SP 2023: 1822-1839 - [c16]Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu:
TPatch: A Triggered Physical Adversarial Patch. USENIX Security Symposium 2023: 661-678 - [c15]Shibo Zhang, Yushi Cheng, Wenjun Zhu, Xiaoyu Ji, Wenyuan Xu:
CAPatch: Physical Adversarial Patch against Image Captioning Systems. USENIX Security Symposium 2023: 679-696 - 2022
- [c14]Jiahui Yang, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
A Small Sticker is Enough: Spoofing Face Recognition Systems via Small Stickers. EITCE 2022: 1075-1082 - [c13]Junning Ze, Xinfeng Li, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
UltraBD: Backdoor Attack against Automatic Speaker Verification Systems via Adversarial Ultrasound. ICPADS 2022: 193-200 - [c12]Shan Zou, Juchuan Zhang, Shui Jiang, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
OutletGuarder: Detecting DarkSide Ransomware by Power Factor Correction Signals in an Electrical Outlet. ICPADS 2022: 419-426 - [c11]Ruiwen He, Xiaoyu Ji, Xinfeng Li, Yushi Cheng, Wenyuan Xu:
"OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score. USENIX Security Symposium 2022: 1131-1148 - 2021
- [c10]Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, Kevin Fu:
Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision. SP 2021: 160-175 - [c9]Yushi Cheng, Xiaoyu Ji, Lixu Wang, Qi Pang, Yi-Chao Chen, Wenyuan Xu:
mID: Tracing Screen Photos via Moiré Patterns. USENIX Security Symposium 2021: 2969-2986 - 2019
- [c8]Yushi Cheng, Xiaoyu Ji, Wenyuan Xu, Hao Pan, Zhuangdi Zhu, Chuang-Wen You, Yi-Chao Chen, Lili Qiu:
MagAttack: Guessing Application Launching and Operation via Smartphone. AsiaCCS 2019: 283-294 - [c7]Yushi Cheng, Xiaoyu Ji, Juchuan Zhang, Wenyuan Xu, Yi-Chao Chen:
DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU. CCS 2019: 1149-1170 - 2018
- [c6]Yushi Cheng, Xiaoyu Ji, Tianyang Lu, Wenyuan Xu:
DeWiCam: Detecting Hidden Wireless Cameras via Smartphones. AsiaCCS 2018: 1-13 - [c5]Liang Zhou, Xuan Ouyang, Huan Ying, Lifang Han, Yushi Cheng, Tianchen Zhang:
Cyber-Attack Classification in Smart Grid via Deep Neural Network. CSAE 2018: 90:1-90:5 - [c4]Xiaopeng Li, Sharaf J. Malebary, Xianshan Qu, Xiaoyu Ji, Yushi Cheng, Wenyuan Xu:
iCare: Automatic and User-friendly Child Identification on Smartphones. HotMobile 2018: 43-48 - 2017
- [c3]Yushi Cheng, Xiaoyu Ji, Xinyan Zhou, Wenyuan Xu:
HomeSpy: Inferring User Presence via Encrypted Traffic of Home Surveillance Camera. ICPADS 2017: 779-782 - [c2]Xinyan Zhou, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
SADO: State-associated and delay-oriented data collection for intertidal WSNs. WCSP 2017: 1-6 - 2003
- [c1]Xiang Li, King Jim Hee, Yushi Cheng:
A Web-Based Intelligent Forecasting System. KES 2003: 993-999
Informal and Other Publications
- 2024
- [i4]Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu:
TPatch: A Triggered Physical Adversarial Patch. CoRR abs/2401.00148 (2024) - [i3]Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
CamPro: Camera-based Anti-Facial Recognition. CoRR abs/2401.00151 (2024) - 2023
- [i2]Xinfeng Li, Junning Ze, Chen Yan, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound. CoRR abs/2306.16022 (2023) - [i1]Bo Yang, Xiaoyu Ji, Zizhi Jin, Yushi Cheng, Wenyuan Xu:
Exploring Adversarial Robustness of LiDAR-Camera Fusion Model in Autonomous Driving. CoRR abs/2312.01468 (2023)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 01:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint