Follow
Yuxuan Chen
Yuxuan Chen
Verified email at sdu.edu.cn - Homepage
Title
Cited by
Cited by
Year
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
X Yuan, Y Chen, Y Zhao, Y Long, X Liu, K Chen, S Zhang, H Huang, ...
USENIX Security 2018, 2018
2962018
{Devil’s} whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices
Y Chen, X Yuan, J Zhang, Y Zhao, S Zhang, K Chen, XF Wang
29th USENIX Security Symposium (USENIX Security 20), 2667-2684, 2020
1742020
All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo
X Yuan, Y Chen, A Wang, K Chen, S Zhang, H Huang, I Molloy
IEEE Global Communications Conference 2018, 2018
542018
Sok: A modularized approach to study the security of automatic speech recognition systems
Y Chen, J Zhang, X Yuan, S Zhang, K Chen, X Wang, S Guo
ACM Transactions on Privacy and Security 25 (3), 1-31, 2022
252022
Research on cost-optimal algorithm of multi-QoS constraints for task scheduling in hybrid-cloud
Y Liu, C Li, Z Yang, Y Chen, L Xu
J. Softw. Eng 9 (1), 33-49, 2015
62015
Manipulating Users’ Trust on Amazon Echo: Compromising Smart Home from Outside
Y Chen, X Yuan, A Wang, K Chen, S Zhang, H Huang
EAI Endorsed Transactions on Security and Safety 6 (22), 2020
32020
Adversarial Attacks Against Deep Learning-Based Speech Recognition Systems
X Yuan, Y Chen, K Chen, S Zhang, XF Wang
Cyber Security Meets Machine Learning, 99-127, 2021
12021
Performance Guarantee Mechanism for Multi-Tenancy SaaS Service Based on Kalman Filtering
L Yanpei, L Chunlin, Y Zhiyong, C Yuxuan, X Lijun
Cybernetics and Information Technologies 15 (3), 150-164, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–8