When good becomes evil: Keystroke inference with smartwatch X Liu, Z Zhou, W Diao, Z Li, K Zhang Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 236 | 2015 |
Your voice assistant is mine: How to abuse speakers to steal information and control your phone W Diao, X Liu, Z Zhou, K Zhang Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014 | 205 | 2014 |
Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound Z Zhou, W Diao, X Liu, K Zhang Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 126 | 2014 |
On code execution tracking via power side-channel Y Liu, L Wei, Z Zhou, K Zhang, W Xu, Q Xu Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 97 | 2016 |
Invisible mask: Practical attacks on face recognition with infrared Z Zhou, D Tang, X Wang, W Han, X Liu, K Zhang arXiv preprint arXiv:1803.04683, 2018 | 85 | 2018 |
Leaky dnn: Stealing deep-learning model secret with gpu context-switching side-channel J Wei, Y Zhang, Z Zhou, Z Li, MA Al Faruque 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020 | 84 | 2020 |
Face flashing: a secure liveness detection protocol based on light reflections D Tang, Z Zhou, Y Zhang, K Zhang arXiv preprint arXiv:1801.01949, 2018 | 70 | 2018 |
A survey of practical adversarial example attacks L Sun, M Tan, Z Zhou Cybersecurity 1 (1), 9, 2018 | 49 | 2018 |
Vulnerable gpu memory management: towards recovering raw data from gpu Z Zhou, W Diao, X Liu, Z Li, K Zhang, R Liu arXiv preprint arXiv:1605.06610, 2016 | 37 | 2016 |
Picking up my tab: Understanding and mitigating synchronized token lifting and spending in mobile payment X Bai, Z Zhou, XF Wang, Z Li, X Mi, N Zhang, T Li, SM Hu, K Zhang 26th USENIX Security Symposium (USENIX Security 17), 593-608, 2017 | 36 | 2017 |
MeshUp: Stateless cache side-channel attack on CPU mesh J Wan, Y Bi, Z Zhou, Z Li 2022 IEEE Symposium on Security and Privacy (SP), 1506-1524, 2022 | 26 | 2022 |
Invisible probe: Timing attacks with pcie congestion side-channel M Tan, J Wan, Z Zhou, Z Li 2021 IEEE Symposium on Security and Privacy (SP), 322-338, 2021 | 25 | 2021 |
Privacy-preserving Wi-Fi fingerprinting indoor localization T Zhang, SSM Chow, Z Zhou, M Li Advances in Information and Computer Security: 11th International Workshop …, 2016 | 24 | 2016 |
An empirical study on android for saving non-shared data on public storage X Liu, Z Zhou, W Diao, Z Li, K Zhang ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015 | 24 | 2015 |
RoLMA: a practical adversarial attack against deep learning-based LPR systems M Zha, G Meng, C Lin, Z Zhou, K Chen Information Security and Cryptology: 15th International Conference, Inscrypt …, 2020 | 17 | 2020 |
Efficient authenticated multi-pattern matching Z Zhou, T Zhang, SSM Chow, Y Zhang, K Zhang Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 12 | 2016 |
Mind-reading: Privacy attacks exploiting cross-app KeyEvent injections W Diao, X Liu, Z Zhou, K Zhang, Z Li Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 7 | 2015 |
All your VMs are disconnected: Attacking hardware virtualized network Z Zhou, Z Li, K Zhang Proceedings of the Seventh ACM on Conference on Data and Application …, 2017 | 6 | 2017 |
Gateless treasure: How to get sensitive information from unprotected external storage on Android phones X Liu, W Diao, Z Zhou, Z Li, K Zhang CoRR, vol. abs/1407.5410, 2014 | 6 | 2014 |
Volcano: Stateless cache side-channel attack by exploiting mesh interconnect J Wan, Y Bi, Z Zhou, Z Li arXiv preprint arXiv:2103.04533, 2021 | 5 | 2021 |