When good becomes evil: Keystroke inference with smartwatch X Liu, Z Zhou, W Diao, Z Li, K Zhang Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 236 | 2015 |
Your voice assistant is mine: How to abuse speakers to steal information and control your phone W Diao, X Liu, Z Zhou, K Zhang Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014 | 207 | 2014 |
Understanding android obfuscation techniques: A large-scale investigation in the wild S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang Security and Privacy in Communication Networks: 14th International …, 2018 | 151 | 2018 |
Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound Z Zhou, W Diao, X Liu, K Zhang Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 126 | 2014 |
Invisible mask: Practical attacks on face recognition with infrared Z Zhou, D Tang, X Wang, W Han, X Liu, K Zhang arXiv preprint arXiv:1803.04683, 2018 | 87 | 2018 |
No pardon for the interruption: New inference attacks on android through interrupt timing analysis W Diao, X Liu, Z Li, K Zhang 2016 IEEE Symposium on Security and Privacy (SP), 414-432, 2016 | 73 | 2016 |
Vulnerable gpu memory management: towards recovering raw data from gpu Z Zhou, W Diao, X Liu, Z Li, K Zhang, R Liu arXiv preprint arXiv:1605.06610, 2016 | 37 | 2016 |
Semattack: Natural textual attacks via different semantic spaces B Wang, C Xu, X Liu, Y Cheng, B Li arXiv preprint arXiv:2205.01287, 2022 | 33 | 2022 |
Evading android runtime analysis through detecting programmed interactions W Diao, X Liu, Z Li, K Zhang Proceedings of the 9th ACM conference on security & privacy in wireless and …, 2016 | 32 | 2016 |
An empirical study on android for saving non-shared data on public storage X Liu, Z Zhou, W Diao, Z Li, K Zhang ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015 | 27* | 2015 |
Kindness is a Risky Business: On the Usage of the Accessibility {APIs} in Android W Diao, Y Zhang, L Zhang, Z Li, F Xu, X Pan, X Liu, J Weng, K Zhang, ... 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 25 | 2019 |
Incorporating external POS tagger for punctuation restoration N Shi, W Wang, B Wang, J Li, X Liu, Z Lin arXiv preprint arXiv:2106.06731, 2021 | 10 | 2021 |
Mind-reading: Privacy attacks exploiting cross-app KeyEvent injections W Diao, X Liu, Z Zhou, K Zhang, Z Li Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 7 | 2015 |
Fairrec: fairness testing for deep recommender systems H Guo, J Li, J Wang, X Liu, D Wang, Z Hu, R Zhang, H Xue Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 6 | 2023 |
Instrumental variable-driven domain generalization with unobserved confounders J Yuan, X Ma, R Xiong, M Gong, X Liu, F Wu, L Lin, K Kuang ACM Transactions on Knowledge Discovery from Data 17 (8), 1-21, 2023 | 5 | 2023 |
ShadowDroid: practical black-box attack against ML-based android malware detection J Zhang, C Zhang, X Liu, Y Wang, W Diao, S Guo 2021 IEEE 27th International Conference on Parallel and Distributed Systems …, 2021 | 5 | 2021 |
Enhancing model robustness by incorporating adversarial knowledge into semantic representation J Li, T Du, X Liu, R Zhang, H Xue, S Ji ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021 | 4 | 2021 |
Protecting mobile networks and devices: Challenges and solutions W Meng, X Luo, S Furnell, J Zhou CRC Press, 2016 | 4 | 2016 |
Counterfactual adversarial learning with representation interpolation W Wang, B Wang, N Shi, J Li, B Zhu, X Liu, R Zhang arXiv preprint arXiv:2109.04746, 2021 | 3 | 2021 |
Rochbert: Towards robust BERT fine-tuning for chinese Z Zhang, J Li, N Shi, B Yuan, X Liu, R Zhang, H Xue, D Sun, C Zhang arXiv preprint arXiv:2210.15944, 2022 | 2 | 2022 |