Cong Shi
Cong Shi
Rutgers University
Verified email at
Cited by
Cited by
Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT
C Shi, J Liu, H Liu, Y Chen
Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc …, 2017
WiFi-enabled smart human dynamics monitoring
X Guo, B Liu, C Shi, H Liu, Y Chen, MC Chuah
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 1-13, 2017
Device-free personalized fitness assistant using WiFi
X Guo, J Liu, C Shi, H Liu, Y Chen, MC Chuah
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018
Improvement of the depth resolution in depth-resolved wavenumber-scanning interferometry using multiple uncorrelated wavenumber bands
J Xu, Y Liu, B Dong, Y Bai, L Hu, C Shi, Z Xu, Y Zhou
Applied optics 52 (20), 4890-4897, 2013
Real-time, universal, and robust adversarial attacks against speaker recognition systems
Y Xie, C Shi, Z Li, J Liu, Y Chen, B Yuan
ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and …, 2020
Practical adversarial attacks against speaker recognition systems
Z Li, C Shi, Y Xie, J Liu, B Yuan, Y Chen
Proceedings of the 21st International Workshop on Mobile Computing Systems …, 2020
Enabling Fast and Universal Audio Adversarial Attack Using Generative Model
Y Xie, Z Li, C Shi, J Liu, Y Chen, B Yuan
arXiv preprint arXiv:2004.12261, 2020
CardioCam: Leveraging Camera on Mobile Devices to Verify Users While Their Heart is Pumping
J Liu, C Shi, Y Chen, H Liu, M Gruteser
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
Secret key distribution leveraging color shift over visible light channel
H Liu, B Liu, C Shi, Y Chen
2017 IEEE Conference on Communications and Network Security (CNS), 1-9, 2017
WearID: Wearable-Assisted Low-Effort Authentication to Voice Assistants using Cross-Domain Speech Similarity
C Wang, C Shi, Y Chen, Y Wang, N Saxena
arXiv preprint arXiv:2003.09083, 2020
WiFi-Enabled User Authentication through Deep Learning in Daily Activities
C Shi, J Liu, H Liu, Y Chen
ACM Transactions on Internet of Things 2 (2), 1-25, 2021
WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training
C Shi, Y Wang, Y Chen, N Saxena, C Wang
Annual Computer Security Applications Conference, 829–842, 2020
Multiresolution mutual information method for social network entity resolution
C Shi, R Duan
2015 IEEE International Conference on Data Mining Workshop (ICDMW), 240-247, 2015
Authentication of Voice Commands by Leveraging Vibrations in Wearables
C Shi, Y Wang, Y Chen, N Saxena
IEEE Security & Privacy, 2021
Enabling Secret Key Distribution Over Screen-to-Camera Channel Leveraging Color Shift Property
H Liu, C Shi, Y Chen
IEEE Transactions on Mobile Computing, 2021
Real-time, Robust and Adaptive Universal Adversarial Attacks Against Speaker Recognition Systems
Y Xie, Z Li, C Shi, J Liu, Y Chen, B Yuan
Journal of Signal Processing Systems, 1-14, 2021
Towards Environment-independent Behavior-based User Authentication Using WiFi
C Shi, J Liu, N Borodinov, B Leao, Y Chen
2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems …, 2020
Mobile Device Usage Recommendation based on User Context Inference Using Embedded Sensors
C Shi, X Guo, T Yu, Y Chen, Y Xie, J Liu
2020 29th International Conference on Computer Communications and Networks …, 2020
Device-free Activity Monitoring Through Real-time Analysis on Prevalent WiFi Signals
C Shi, J Esposito, S Mathew, A Patel, R Sakhuja, J Liu, Y Chen
2019 IEEE International Symposium on Dynamic Spectrum Access Networks …, 2019
The system can't perform the operation now. Try again later.
Articles 1–19