Follow
Zhe Zhou
Zhe Zhou
Verified email at fudan.edu.cn - Homepage
Title
Cited by
Cited by
Year
When good becomes evil: Keystroke inference with smartwatch
X Liu, Z Zhou, W Diao, Z Li, K Zhang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2512015
Your voice assistant is mine: How to abuse speakers to steal information and control your phone
W Diao, X Liu, Z Zhou, K Zhang
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
2172014
Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound
Z Zhou, W Diao, X Liu, K Zhang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1312014
Leaky dnn: Stealing deep-learning model secret with gpu context-switching side-channel
J Wei, Y Zhang, Z Zhou, Z Li, MA Al Faruque
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
1212020
On code execution tracking via power side-channel
Y Liu, L Wei, Z Zhou, K Zhang, W Xu, Q Xu
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
1112016
Invisible mask: Practical attacks on face recognition with infrared
Z Zhou, D Tang, X Wang, W Han, X Liu, K Zhang
arXiv preprint arXiv:1803.04683, 2018
1002018
Face flashing: a secure liveness detection protocol based on light reflections
D Tang, Z Zhou, Y Zhang, K Zhang
arXiv preprint arXiv:1801.01949, 2018
732018
A survey of practical adversarial example attacks
L Sun, M Tan, Z Zhou
Cybersecurity 1 (1), 9, 2018
612018
Vulnerable gpu memory management: towards recovering raw data from gpu
Z Zhou, W Diao, X Liu, Z Li, K Zhang, R Liu
arXiv preprint arXiv:1605.06610, 2016
432016
Invisible probe: Timing attacks with PCIe congestion side-channel
M Tan, J Wan, Z Zhou, Z Li
2021 IEEE Symposium on Security and Privacy (SP), 322-338, 2021
392021
Picking up my tab: Understanding and mitigating synchronized token lifting and spending in mobile payment
X Bai, Z Zhou, XF Wang, Z Li, X Mi, N Zhang, T Li, SM Hu, K Zhang
26th USENIX Security Symposium (USENIX Security 17), 593-608, 2017
392017
MeshUp: Stateless cache side-channel attack on CPU mesh
J Wan, Y Bi, Z Zhou, Z Li
2022 IEEE Symposium on Security and Privacy (SP), 1506-1524, 2022
372022
Privacy-preserving Wi-Fi fingerprinting indoor localization
T Zhang, SSM Chow, Z Zhou, M Li
Advances in Information and Computer Security: 11th International Workshop …, 2016
282016
An empirical study on android for saving non-shared data on public storage
X Liu, Z Zhou, W Diao, Z Li, K Zhang
ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015
242015
Rolma: a practical adversarial attack against deep learning-based LPR systems
M Zha, G Meng, C Lin, Z Zhou, K Chen
Information Security and Cryptology: 15th International Conference, Inscrypt …, 2020
222020
Efficient authenticated multi-pattern matching
Z Zhou, T Zhang, SSM Chow, Y Zhang, K Zhang
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
122016
Userspace Bypass: Accelerating Syscall-intensive Applications
Z Zhou, Y Bi, J Wan, Y Zhou, Z Li
17th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2023
92023
Volcano: Stateless cache side-channel attack by exploiting mesh interconnect
J Wan, Y Bi, Z Zhou, Z Li
arXiv preprint arXiv:2103.04533, 2021
82021
Mind-reading: Privacy attacks exploiting cross-app KeyEvent injections
W Diao, X Liu, Z Zhou, K Zhang, Z Li
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
82015
Beware of your screen: Anonymous fingerprinting of device screens for off-line payment protection
Z Zhou, D Tang, W Wang, X Wang, Z Li, K Zhang
Proceedings of the 34th Annual Computer Security Applications Conference, 77-88, 2018
72018
The system can't perform the operation now. Try again later.
Articles 1–20