Xiangyu Liu
Xiangyu Liu
Alibaba Group
Verified email at
Cited by
Cited by
When good becomes evil: Keystroke inference with smartwatch
X Liu, Z Zhou, W Diao, Z Li, K Zhang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Your voice assistant is mine: How to abuse speakers to steal information and control your phone
W Diao, X Liu, Z Zhou, K Zhang
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
Understanding android obfuscation techniques: A large-scale investigation in the wild
S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang
Security and Privacy in Communication Networks: 14th International …, 2018
Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound
Z Zhou, W Diao, X Liu, K Zhang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Invisible mask: Practical attacks on face recognition with infrared
Z Zhou, D Tang, X Wang, W Han, X Liu, K Zhang
arXiv preprint arXiv:1803.04683, 2018
No pardon for the interruption: New inference attacks on android through interrupt timing analysis
W Diao, X Liu, Z Li, K Zhang
2016 IEEE Symposium on Security and Privacy (SP), 414-432, 2016
Vulnerable gpu memory management: towards recovering raw data from gpu
Z Zhou, W Diao, X Liu, Z Li, K Zhang, R Liu
arXiv preprint arXiv:1605.06610, 2016
Semattack: Natural textual attacks via different semantic spaces
B Wang, C Xu, X Liu, Y Cheng, B Li
arXiv preprint arXiv:2205.01287, 2022
Evading android runtime analysis through detecting programmed interactions
W Diao, X Liu, Z Li, K Zhang
Proceedings of the 9th ACM conference on security & privacy in wireless and …, 2016
An empirical study on android for saving non-shared data on public storage
X Liu, Z Zhou, W Diao, Z Li, K Zhang
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015
Kindness is a Risky Business: On the Usage of the Accessibility {APIs} in Android
W Diao, Y Zhang, L Zhang, Z Li, F Xu, X Pan, X Liu, J Weng, K Zhang, ...
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
Incorporating external POS tagger for punctuation restoration
N Shi, W Wang, B Wang, J Li, X Liu, Z Lin
arXiv preprint arXiv:2106.06731, 2021
Mind-reading: Privacy attacks exploiting cross-app KeyEvent injections
W Diao, X Liu, Z Zhou, K Zhang, Z Li
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
Fairrec: fairness testing for deep recommender systems
H Guo, J Li, J Wang, X Liu, D Wang, Z Hu, R Zhang, H Xue
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
Instrumental variable-driven domain generalization with unobserved confounders
J Yuan, X Ma, R Xiong, M Gong, X Liu, F Wu, L Lin, K Kuang
ACM Transactions on Knowledge Discovery from Data 17 (8), 1-21, 2023
ShadowDroid: practical black-box attack against ML-based android malware detection
J Zhang, C Zhang, X Liu, Y Wang, W Diao, S Guo
2021 IEEE 27th International Conference on Parallel and Distributed Systems …, 2021
Enhancing model robustness by incorporating adversarial knowledge into semantic representation
J Li, T Du, X Liu, R Zhang, H Xue, S Ji
ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021
Protecting mobile networks and devices: Challenges and solutions
W Meng, X Luo, S Furnell, J Zhou
CRC Press, 2016
Counterfactual adversarial learning with representation interpolation
W Wang, B Wang, N Shi, J Li, B Zhu, X Liu, R Zhang
arXiv preprint arXiv:2109.04746, 2021
Rochbert: Towards robust BERT fine-tuning for chinese
Z Zhang, J Li, N Shi, B Yuan, X Liu, R Zhang, H Xue, D Sun, C Zhang
arXiv preprint arXiv:2210.15944, 2022
The system can't perform the operation now. Try again later.
Articles 1–20