Follow
Man Zhou
Title
Cited by
Cited by
Year
Voicepop: A pop noise based anti-spoofing system for voice authentication on smartphones
Q Wang, X Lin, M Zhou, Y Chen, C Wang, Q Li, X Luo
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2062-2070, 2019
1112019
Messages behind the sound: real-time hidden acoustic signal capture with smartphones
Q Wang, K Ren, M Zhou, T Lei, D Koutsonikolas, L Su
Proceedings of the 22nd Annual International Conference on Mobile Computing …, 2016
982016
Patternlistener: Cracking android pattern lock using acoustic signals
M Zhou, Q Wang, J Yang, Q Li, F Xiao, Z Wang, X Chen
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
852018
LVID: A multimodal biometrics authentication system on smartphones
L Wu, J Yang, M Zhou, Y Chen, Q Wang
IEEE Transactions on Information Forensics and Security 15, 1572-1585, 2020
842020
Rain bar: Robust application-driven visual communication using color barcodes
Q Wang, M Zhou, K Ren, T Lei, J Li, Z Wang
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
742015
Hidden voice commands: Attacks and defenses on the VCS of autonomous driving cars
M Zhou, Z Qin, X Lin, S Hu, Q Wang, K Ren
IEEE Wireless Communications 26 (5), 128-133, 2019
592019
Dolphin: Real-time hidden acoustic signal capture with smartphones
M Zhou, Q Wang, K Ren, D Koutsonikolas, L Su, Y Chen
IEEE Transactions on Mobile Computing 18 (3), 560-573, 2019
412019
Stealing your android patterns via acoustic signals
M Zhou, Q Wang, J Yang, Q Li, P Jiang, Y Chen, Z Wang
IEEE Transactions on Mobile Computing 20 (4), 1656-1671, 2021
332021
Enabling online robust barcode-based visible light communication with realtime feedback
M Zhou, Q Wang, T Lei, Z Wang, K Ren
IEEE Transactions on Wireless Communications 17 (12), 8063-8076, 2018
272018
Active link obfuscation to thwart link-flooding attacks for internet of things
X Ding, F Xiao, M Zhou, Z Wang
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
21*2020
Securing face liveness detection using unforgeable lip motion patterns
M Zhou, Q Wang, Q Li, W Zhou, J Yang, C Shen
IEEE Transactions on Mobile Computing, 2024
122024
Securing liveness detection for voice authentication via pop noises
P Jiang, Q Wang, X Lin, M Zhou, W Ding, C Wang, C Shen, Q Li
IEEE Transactions on Dependable and Secure Computing 20 (2), 1702-1718, 2023
102023
Presspin: Enabling secure pin authentication on mobile devices via structure-borne sounds
M Zhou, Q Wang, X Lin, Y Zhao, P Jiang, Q Li, C Shen, C Wang
IEEE Transactions on Dependable and Secure Computing 20 (2), 1228-1242, 2023
102023
SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals
D Liu, Q Wang, M Zhou, P Jiang, Q Li, C Shen, C Wang
IEEE Transactions on Dependable and Secure Computing 20 (2), 1687-1701, 2023
92023
Poster: Enabling secure location authentication in drone
F Xiao, M Zhou, Y Liye, J Yang, Q Wang
Proceedings of the 23rd Annual International Conference on Mobile Computing …, 2017
42017
Where Are the Dots: Hardening Face Authentication on Smartphones With Unforgeable Eye Movement Patterns
Z Zheng, Q Wang, C Wang, M Zhou, Y Zhao, Q Li, C Shen
IEEE Transactions on Information Forensics and Security 18, 1295-1308, 2023
32023
SonarGuard: Ultrasonic Face Liveness Detection on Mobile Devices
D Zhang, J Meng, J Zhang, X Deng, S Ding, M Zhou, Q Wang, Q Li, ...
IEEE Transactions on Circuits and Systems for Video Technology 33 (8), 4401 …, 2023
22023
Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints
M Li, W Wan, J Lu, S Hu, J Shi, LY Zhang, M Zhou, Y Zheng
2022 18th International Conference on Mobility, Sensing and Networking (MSN …, 2022
22022
FingerPattern: Securing Pattern Lock Via Fingerprint-Dependent Friction Sound
M Zhou, Y Zhou, S Su, Q Wang, Q Li, S Hu, C Yu, Z Li
IEEE Transactions on Mobile Computing, 2023
12023
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
M Zhou, S Su, Q Wang, Q Li, Y Zhou, X Ma, Z Li
Proceedings of Network and Distributed System Security (NDSS) Symposium, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20