When good becomes evil: Keystroke inference with smartwatch X Liu, Z Zhou, W Diao, Z Li, K Zhang Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 251 | 2015 |
Your voice assistant is mine: How to abuse speakers to steal information and control your phone W Diao, X Liu, Z Zhou, K Zhang Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014 | 217 | 2014 |
Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound Z Zhou, W Diao, X Liu, K Zhang Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 131 | 2014 |
Leaky dnn: Stealing deep-learning model secret with gpu context-switching side-channel J Wei, Y Zhang, Z Zhou, Z Li, MA Al Faruque 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020 | 121 | 2020 |
On code execution tracking via power side-channel Y Liu, L Wei, Z Zhou, K Zhang, W Xu, Q Xu Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 111 | 2016 |
Invisible mask: Practical attacks on face recognition with infrared Z Zhou, D Tang, X Wang, W Han, X Liu, K Zhang arXiv preprint arXiv:1803.04683, 2018 | 100 | 2018 |
Face flashing: a secure liveness detection protocol based on light reflections D Tang, Z Zhou, Y Zhang, K Zhang arXiv preprint arXiv:1801.01949, 2018 | 73 | 2018 |
A survey of practical adversarial example attacks L Sun, M Tan, Z Zhou Cybersecurity 1 (1), 9, 2018 | 61 | 2018 |
Vulnerable gpu memory management: towards recovering raw data from gpu Z Zhou, W Diao, X Liu, Z Li, K Zhang, R Liu arXiv preprint arXiv:1605.06610, 2016 | 43 | 2016 |
Invisible probe: Timing attacks with PCIe congestion side-channel M Tan, J Wan, Z Zhou, Z Li 2021 IEEE Symposium on Security and Privacy (SP), 322-338, 2021 | 39 | 2021 |
Picking up my tab: Understanding and mitigating synchronized token lifting and spending in mobile payment X Bai, Z Zhou, XF Wang, Z Li, X Mi, N Zhang, T Li, SM Hu, K Zhang 26th USENIX Security Symposium (USENIX Security 17), 593-608, 2017 | 39 | 2017 |
MeshUp: Stateless cache side-channel attack on CPU mesh J Wan, Y Bi, Z Zhou, Z Li 2022 IEEE Symposium on Security and Privacy (SP), 1506-1524, 2022 | 37 | 2022 |
Privacy-preserving Wi-Fi fingerprinting indoor localization T Zhang, SSM Chow, Z Zhou, M Li Advances in Information and Computer Security: 11th International Workshop …, 2016 | 28 | 2016 |
An empirical study on android for saving non-shared data on public storage X Liu, Z Zhou, W Diao, Z Li, K Zhang ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015 | 24 | 2015 |
Rolma: a practical adversarial attack against deep learning-based LPR systems M Zha, G Meng, C Lin, Z Zhou, K Chen Information Security and Cryptology: 15th International Conference, Inscrypt …, 2020 | 22 | 2020 |
Efficient authenticated multi-pattern matching Z Zhou, T Zhang, SSM Chow, Y Zhang, K Zhang Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 12 | 2016 |
Userspace Bypass: Accelerating Syscall-intensive Applications Z Zhou, Y Bi, J Wan, Y Zhou, Z Li 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2023 | 9 | 2023 |
Volcano: Stateless cache side-channel attack by exploiting mesh interconnect J Wan, Y Bi, Z Zhou, Z Li arXiv preprint arXiv:2103.04533, 2021 | 8 | 2021 |
Mind-reading: Privacy attacks exploiting cross-app KeyEvent injections W Diao, X Liu, Z Zhou, K Zhang, Z Li Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 8 | 2015 |
Beware of your screen: Anonymous fingerprinting of device screens for off-line payment protection Z Zhou, D Tang, W Wang, X Wang, Z Li, K Zhang Proceedings of the 34th Annual Computer Security Applications Conference, 77-88, 2018 | 7 | 2018 |