CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition X Yuan, Y Chen, Y Zhao, Y Long, X Liu, K Chen, S Zhang, H Huang, ... USENIX Security 2018, 2018 | 296 | 2018 |
{Devil’s} whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices Y Chen, X Yuan, J Zhang, Y Zhao, S Zhang, K Chen, XF Wang 29th USENIX Security Symposium (USENIX Security 20), 2667-2684, 2020 | 174 | 2020 |
All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo X Yuan, Y Chen, A Wang, K Chen, S Zhang, H Huang, I Molloy IEEE Global Communications Conference 2018, 2018 | 54 | 2018 |
Sok: A modularized approach to study the security of automatic speech recognition systems Y Chen, J Zhang, X Yuan, S Zhang, K Chen, X Wang, S Guo ACM Transactions on Privacy and Security 25 (3), 1-31, 2022 | 25 | 2022 |
Research on cost-optimal algorithm of multi-QoS constraints for task scheduling in hybrid-cloud Y Liu, C Li, Z Yang, Y Chen, L Xu J. Softw. Eng 9 (1), 33-49, 2015 | 6 | 2015 |
Manipulating Users’ Trust on Amazon Echo: Compromising Smart Home from Outside Y Chen, X Yuan, A Wang, K Chen, S Zhang, H Huang EAI Endorsed Transactions on Security and Safety 6 (22), 2020 | 3 | 2020 |
Adversarial Attacks Against Deep Learning-Based Speech Recognition Systems X Yuan, Y Chen, K Chen, S Zhang, XF Wang Cyber Security Meets Machine Learning, 99-127, 2021 | 1 | 2021 |
Performance Guarantee Mechanism for Multi-Tenancy SaaS Service Based on Kalman Filtering L Yanpei, L Chunlin, Y Zhiyong, C Yuxuan, X Lijun Cybernetics and Information Technologies 15 (3), 150-164, 2015 | | 2015 |