CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition Y X, C Y, Z Y, L Y, L X, C K, Z S, H H, W XF, G CA 27th USENIX Security Symposium (USENIX Security 18), 2018 | 296* | 2018 |
Seeing isn't believing: Towards more robust adversarial attack against real world object detectors Y Zhao, H Zhu, R Liang, Q Shen, S Zhang, K Chen Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 233 | 2019 |
Trustshadow: Secure execution of unmodified applications with arm trustzone L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017 | 175 | 2017 |
{Devil’s} whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices Y Chen, X Yuan, J Zhang, Y Zhao, S Zhang, K Chen, XF Wang 29th USENIX Security Symposium (USENIX Security 20), 2667-2684, 2020 | 174 | 2020 |
All your alexa are belong to us: A remote voice control attack against echo X Yuan, Y Chen, A Wang, K Chen, S Zhang, H Huang, IM Molloy 2018 IEEE global communications conference (GLOBECOM), 1-6, 2018 | 54 | 2018 |
Machine learning based cross-site scripting detection in online social network R Wang, X Jia, Q Li, S Zhang 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 …, 2014 | 48 | 2014 |
A robustness-assured white-box watermark in neural networks P Lv, P Li, S Zhang, K Chen, R Liang, H Ma, Y Zhao, Y Li IEEE Transactions on Dependable and Secure Computing 20 (6), 5214-5229, 2023 | 32* | 2023 |
Sok: A modularized approach to study the security of automatic speech recognition systems Y Chen, J Zhang, X Yuan, S Zhang, K Chen, X Wang, S Guo ACM Transactions on Privacy and Security 25 (3), 1-31, 2022 | 25 | 2022 |
A comprehensive study of co-residence threat in multi-tenant public paas clouds W Zhang, X Jia, C Wang, S Zhang, Q Huang, M Wang, P Liu Information and Communications Security: 18th International Conference …, 2016 | 23 | 2016 |
Cross-layer damage assessment for cyber situational awareness P Liu, X Jia, S Zhang, X Xiong, YC Jhi, K Bai, J Li Cyber Situational Awareness: Issues and Research, 155-176, 2010 | 21 | 2010 |
DBIA: Data-Free Backdoor Attack Against Transformer Networks P Lv, H Ma, J Zhou, R Liang, K Chen, S Zhang, Y Yang 2023 IEEE International Conference on Multimedia and Expo (ICME), 2819-2824, 2023 | 20* | 2023 |
Building a trustworthy execution environment to defeat exploits from both cyber space and physical space for ARM L Guan, C Cao, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger IEEE Transactions on Dependable and Secure Computing 16 (3), 438-453, 2018 | 20 | 2018 |
Ai-lancet: Locating error-inducing neurons to optimize neural networks Y Zhao, H Zhu, K Chen, S Zhang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 18 | 2021 |
A data-free backdoor injection approach in neural networks P Lv, C Yue, R Liang, Y Yang, S Zhang, H Ma, K Chen 32nd USENIX Security Symposium (USENIX Security 23), 2671-2688, 2023 | 16 | 2023 |
HyperCrop: a hypervisor-based countermeasure for return oriented programming J Jiang, X Jia, D Feng, S Zhang, P Liu International Conference on Information and Communications Security, 360-373, 2011 | 16 | 2011 |
Fast recovery from hidden node collision for IEEE 802.15. 4 LR-WPANs S Zhang, SJ Yoo 7th IEEE International Conference on Computer and Information Technology …, 2007 | 14 | 2007 |
LeakProber: a framework for profiling sensitive data leakage paths J Yu, S Zhang, P Liu, ZT Li Proceedings of the first ACM conference on Data and application security and …, 2011 | 13 | 2011 |
Cross-layer comprehensive intrusion harm analysis for production workload server systems S Zhang, X Jia, P Liu, J Jing Proceedings of the 26th Annual Computer Security Applications Conference …, 2010 | 13 | 2010 |
Ai-guardian: Defeating adversarial attacks using backdoors H Zhu, S Zhang, K Chen 2023 IEEE Symposium on Security and Privacy (SP), 701-718, 2023 | 12 | 2023 |
Defending return‐oriented programming based on virtualization techniques X Jia, R Wang, J Jiang, S Zhang, P Liu Security and Communication Networks 6 (10), 1236-1249, 2013 | 12 | 2013 |