Yuxuan Chen
Yuxuan Chen
Verified email at my.fit.edu
Cited by
Cited by
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
X Yuan, Y Chen, Y Zhao, Y Long, X Liu, K Chen, S Zhang, H Huang, ...
USENIX Security 2018, 2018
All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo
X Yuan, Y Chen, A Wang, K Chen, S Zhang, H Huang, I Molloy
IEEE Global Communications Conference 2018, 2018
Devil’s whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices
Y Chen, X Yuan, J Zhang, Y Zhao, S Zhang, K Chen, XF Wang
29th USENIX Security Symposium (USENIX Security 20), 2020
Research on cost-optimal algorithm of multi-QoS constraints for task scheduling in hybrid-cloud
Y Liu, C Li, Z Yang, Y Chen, L Xu
J. Softw. Eng 9 (1), 33-49, 2015
Manipulating Users’ Trust on Amazon Echo: Compromising Smart Home from Outside
Y Chen, X Yuan, A Wang, K Chen, S Zhang, H Huang
EAI Endorsed Transactions on Security and Safety 6 (22), 2020
Performance Guarantee Mechanism for Multi-Tenancy SaaS Service Based on Kalman Filtering
L Yanpei, L Chunlin, Y Zhiyong, C Yuxuan, X Lijun
Cybernetics and Information Technologies 15 (3), 150-164, 2015
The system can't perform the operation now. Try again later.
Articles 1–6