Xiaoyu Ji

ORCID: 0000-0002-1101-0007
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • User Authentication and Security Systems
  • Digital Media Forensic Detection
  • Adversarial Robustness in Machine Learning
  • Speech and Audio Processing
  • Smart Grid Security and Resilience
  • Energy Efficient Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Cryptographic Implementations and Security
  • Speech Recognition and Synthesis
  • Internet Traffic Analysis and Secure E-voting
  • Energy Harvesting in Wireless Networks
  • Music and Audio Processing
  • Electrostatic Discharge in Electronics
  • Wireless Networks and Protocols
  • Biometric Identification and Security
  • Face recognition and analysis
  • Advanced Steganography and Watermarking Techniques
  • QR Code Applications and Technologies
  • Anomaly Detection Techniques and Applications
  • Opportunistic and Delay-Tolerant Networks
  • Mobile Ad Hoc Networks
  • Indoor and Outdoor Localization Technologies
  • Advanced Optical Sensing Technologies

Zhejiang University
2010-2025

State Key Laboratory of Pollution Control and Resource Reuse
2023-2025

Nanjing University
2023-2025

Beijing Obstetrics and Gynecology Hospital
2025

Capital Medical University
2025

Hefei University of Technology
2025

Fudan University
2022-2024

China University of Geosciences (Beijing)
2024

Soochow University
2021-2024

First Affiliated Hospital of Soochow University
2021-2024

Speech recognition (SR) systems such as Siri or Google Now have become an increasingly popular human-computer interaction method, and turned various into voice controllable (VCS). Prior work on attacking VCS shows that the hidden commands are incomprehensible to people can control systems. Hidden commands, though "hidden", nonetheless audible. In this work, we design a totally inaudible attack, DolphinAttack, modulates ultrasonic carriers (e.g., f > 20 kHz) achieve inaudibility. By...

10.1145/3133956.3134052 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2017-10-27

Autonomous vehicles rely on sensors to measure road condition and make driving decisions, their safety relies heavily the reliability of these sensors. Out all obstacle detection sensors, ultrasonic have largest market share are expected be increasingly installed automobiles. Such discover obstacles by emitting ultrasounds analyzing reflections. By exploiting built-in vulnerabilities we designed random spoofing, adaptive jamming attacks managed trick a vehicle stop when it should keep...

10.1109/jiot.2018.2867917 article EN publisher-specific-oa IEEE Internet of Things Journal 2018-08-30

To realize the efficient denitrification of low-temperature (<150 °C) flue gas in nonelectric industries, most promising strategy is to develop NH3 selective catalytic reduction (NH3–SCR) catalysts with superior activity. Conversely, low working temperature offered great flexibility for tuning calcination during catalyst manufacturing. Herein, starting Sm-doped FeMnOx catalyst, an easy but practical regulation was proposed. With increase from 300 600 °C, activity FeMnSmOx increased first and...

10.1021/acs.iecr.3c04018 article EN Industrial & Engineering Chemistry Research 2024-01-31

Voice assistants (VAs) such as Siri and Google Now have become an increasingly popular human-machine interaction method made various systems voice controllable. Prior work on attacking shows that the hidden commands are incomprehensible to people can control VAs. Hidden commands, though `hidden', nonetheless audible. In this work, we design a completely inaudible attack, DolphinAttack, modulates ultrasonic carriers achieve inaudibility. By leveraging nonlinearity of microphone circuits,...

10.1109/tdsc.2019.2906165 article EN publisher-specific-oa IEEE Transactions on Dependable and Secure Computing 2019-01-01

Verifying the identity of voice inputs is important as voices are increasingly used for sensitive operations. Traditional methods focus on differentiating individuals via spectrographic features (e.g., voiceprint), yet cannot cope with spoofing attacks, whereby a malicious attacker synthesizes almost same voiceprint victim or simply replays it. This paper proposes CaField, text-independent speaker verification method to detect loudspeaker-based attacks goal achieving two seemingly...

10.1145/3319535.3354248 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2019-11-06

With the widespread use of smart devices, device authentication has received much attention. One popular method for is to utilize internally-measured fingerprints, such as ID, software or hardware-based characteristics. In this paper, we propose DeMiCPU, a stimulation-response-based fingerprinting technique that relies on externally-measured information, i.e., magnetic induction (MI) signals emitted from CPU module consists chip and its affiliated power supply circuits. The key insight...

10.1145/3319535.3339810 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2019-11-06

Autonomous vehicles and robots increasingly exploit LiDAR-based 3D object detection systems to detect obstacles in environment. Correct classification are important ensure safe driving. Though existing work has demonstrated the feasibility of manipulating point clouds spoof detectors, most attempts conducted digitally. In this paper, we investigate possibility physically fooling by injecting adversarial using lasers. First, develop a laser transceiver that can inject up 4200 points, which is...

10.1109/sp46215.2023.10179458 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2023-05-01

Emissions of volatile organic compounds (VOCs) threaten both the environment and human health. To realize elimination VOCs, Ru/CeO

10.1021/acs.est.4c07159 article EN Environmental Science & Technology 2024-09-26

This paper investigates the problem of energy consumption in wireless sensor networks. Wireless nodes deployed harsh environment where conditions change drastically suffer from sudden changes link quality and node status. The end-to-end delay each varies due to variation On other hand, are supplied with limited it is a great concern extend network lifetime. To cope those problems, this proposes novel simple routing metric, predicted remaining deliveries (PRD), combining parameters, including...

10.1109/jsen.2017.2772321 article EN publisher-specific-oa IEEE Sensors Journal 2017-11-10

Fake base station (FBS) crime is a type of wireless communication that has appeared recently. The key to enforcing the laws on regulating FBS based not only arrest but also convict criminals effectively. Much work discovering, localization, and tracking can assist arresting, problem collecting evidence accurately support proper conviction been addressed yet.

10.1145/3196494.3196521 article EN 2018-05-29

Autonomous vehicles increasingly exploit computer-vision-based object detection systems to perceive environments and make critical driving decisions. To increase the quality of images, image stabilizers with inertial sensors are added alleviate blurring caused by camera jitters. However, such a trend opens new attack surface. This paper identifies system-level vulnerability resulting from combination emerging stabilizer hardware susceptible acoustic manipulation algorithms subject...

10.1109/sp40001.2021.00091 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2021-05-01

IoT devices and other embedded systems are increasingly equipped with cameras that can sense critical information in private spaces.The data security of these cameras, however, has hardly been scrutinized from the hardware design perspective.Our paper presents first attempt to analyze attack surface physical-channel eavesdropping on cameras.We characterize EM Eye-a vulnerability digital image transmission interface allows adversaries reconstruct high-quality streams cameras' unintentional...

10.14722/ndss.2024.24552 article EN 2024-01-01

The emission of NH3 has been reported to pose a serious threat both human health and the environment. To efficiently eliminate NH3, catalysts for selective catalytic oxidation (NH3–SCO) have intensively studied. Fe2O3-based were found exhibit superior activity; however, low N2 selectivity made it less attractive in practical applications. In this work, aimed at improving on catalysts, simple SiO2 doping strategy was proposed. Although activity showed almost no change Fe2O3 after doping,...

10.1021/acs.inorgchem.4c04482 article EN Inorganic Chemistry 2025-01-13

Endometriosis is a common gynecological disorder, with rising incidence rates and decreasing age of onset, significantly affecting patients' quality life overall health. Urinary tract endometriosis (UTE) rare invasive form that often leads to urinary obstruction can even result in renal failure. The clinical significance diagnosing treating UTE increasingly recognized. However, there currently lack systematic bibliometric analysis provide an overview this field. purpose study comprehensively...

10.21037/tau-24-546 article EN Translational Andrology and Urology 2025-01-01

Password guessing is a crucial research direction in password security, considering vulnerabilities like reuse and data breaches. While has extensively explored intra-site guessing, the complexities of cross-site attacks, where attackers use leaked from one site to target another, remain less understood. This study investigates impact dataset feature similarity on performance, revealing that differences significantly influence success more than model variations. By analyzing eight datasets...

10.3390/electronics14050945 article EN Electronics 2025-02-27

As renewable energy sources (RES) continue to expand and the use of power inverters has surged, have become crucial for converting direct current (DC) from RES into alternating (AC) grid, their security is vital maintaining stable grid operations. This paper investigates vulnerabilities photovoltaic (PV) inverters, specifically focusing on internal sensors, which are critical reliable conversion. It found that both voltage sensors susceptible intentional electromagnetic interference (IEMI)...

10.3390/s25051493 article EN cc-by Sensors 2025-02-28

10.1109/icassp49660.2025.10888148 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12
Coming Soon ...