Xiaoyu Ji
Title
Cited by
Cited by
Year
Dolphinatack: Inaudible voice commands
G Zhang, C Yan, X Ji, T Zhang, T Zhang, W Xu
ACM CCS 2017, 2017
4372017
Analyzing and enhancing the security of ultrasonic sensors for autonomous vehicles
W Xu, C Yan, W Jia, X Ji, J Liu
IEEE Internet of Things Journal 5 (6), 5015-5029, 2018
512018
Walking down the STAIRS: Efficient collision resolution for wireless sensor networks
X Ji, Y He, J Wang, W Dong, X Wu, Y Liu
INFOCOM, 2014 Proceedings IEEE, 961 - 969, 2014
352014
Energy efficient link-delay aware routing in wireless sensor networks
X Lai, X Ji, X Zhou, L Chen
IEEE Sensors Journal 18 (2), 837-848, 2017
292017
Fbsleuth: Fake base station forensics via radio frequency fingerprinting
Z Zhuang, X Ji, T Zhang, J Zhang, W Xu, Z Li, Y Liu
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
282018
On Improving Wireless Channel Utilization: A Collision Tolerance-based Approach
X Ji, Y He, J Wang, K Wu, D Liu, K Yi, Y Liu
Mobile Computing, IEEE Transactions on, 2016
262016
Channel-aware rate adaptation for backscatter networks
W Gong, H Liu, J Liu, X Fan, K Liu, Q Ma, X Ji
IEEE/ACM Transactions on Networking 26 (2), 751-764, 2018
242018
Privacy-aware High-Quality Map Generation with Participatory Sensing
X Chen, X Wu, XY Li, X JI, Y He, Y Liu
Mobile Computing, IEEE Transactions on, 1, 2015
242015
The feasibility of injecting inaudible voice commands to voice assistants
C Yan, G Zhang, X Ji, T Zhang, T Zhang, W Xu
IEEE Transactions on Dependable and Secure Computing, 2019
222019
Dewicam: Detecting hidden wireless cameras via smartphones
Y Cheng, X Ji, T Lu, W Xu
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
222018
Voice over the dins: Improving wireless channel utilization with collision tolerance
X Ji, Y He, J Wang, K Wu, K Yi, Y Liu
Network Protocols (ICNP), 2013 21st IEEE International Conference on, 1-10, 2013
222013
Music-touch shoes: vibrotactile interface for hearing impaired dancers
L Yao, Y Shi, H Chi, X Ji, F Ying
TEI '10 Proceedings of the fourth international conference on Tangible …, 2010
192010
The catcher in the field: A fieldprint based spoofing detection for text-independent speaker verification
C Yan, Y Long, X Ji, W Xu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
172019
Demicpu: Device fingerprinting with magnetic signals radiated by cpu
Y Cheng, X Ji, J Zhang, W Xu, YC Chen
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
152019
Hitchhike: Riding Control on Preambles
X Ji, J Wang, M Liu, Y Yan, P Yang, Y Liu
INFOCOM, 2014 Proceedings IEEE, 2499 - 2507, 2014
152014
Cuckoo-RPL: cuckoo filter based RPL for defending AMI network from blackhole attacks
T Zhang, T Zhang, X Ji, W Xu
2019 Chinese Control Conference (CCC), 8920-8925, 2019
102019
COF: Exploiting Concurrency for Low powerOpportunistic Forwarding
D Liu, M Hou, Z Cao, Y He, X Ji, X Zheng
IEEE International Conference on Network Protocols (ICNP), 2015
102015
icare: Automatic and user-friendly child identification on smartphones
X Li, S Malebary, X Qu, X Ji, Y Cheng, W Xu
Proceedings of the 19th International Workshop on Mobile Computing Systems …, 2018
92018
ToAuth: Towards Automatic Near Field Authentication for Smartphones
W Gu, Z Yang, L Shangguan, X Ji, Y Zhao
Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 …, 2014
92014
HlcAuth: Key-free and secure communications via home-limited channel
C Li, X Ji, X Zhou, J Zhang, J Tian, Y Zhang, W Xu
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
82018
The system can't perform the operation now. Try again later.
Articles 1–20