- Advanced Malware Detection Techniques
- User Authentication and Security Systems
- Digital Media Forensic Detection
- Adversarial Robustness in Machine Learning
- Speech and Audio Processing
- Smart Grid Security and Resilience
- Energy Efficient Wireless Sensor Networks
- Network Security and Intrusion Detection
- Physical Unclonable Functions (PUFs) and Hardware Security
- Cryptographic Implementations and Security
- Speech Recognition and Synthesis
- Internet Traffic Analysis and Secure E-voting
- Energy Harvesting in Wireless Networks
- Music and Audio Processing
- Electrostatic Discharge in Electronics
- Wireless Networks and Protocols
- Biometric Identification and Security
- Face recognition and analysis
- Advanced Steganography and Watermarking Techniques
- QR Code Applications and Technologies
- Anomaly Detection Techniques and Applications
- Opportunistic and Delay-Tolerant Networks
- Mobile Ad Hoc Networks
- Indoor and Outdoor Localization Technologies
- Advanced Optical Sensing Technologies
Zhejiang University
2010-2025
State Key Laboratory of Pollution Control and Resource Reuse
2023-2025
Nanjing University
2023-2025
Beijing Obstetrics and Gynecology Hospital
2025
Capital Medical University
2025
Hefei University of Technology
2025
Fudan University
2022-2024
China University of Geosciences (Beijing)
2024
Soochow University
2021-2024
First Affiliated Hospital of Soochow University
2021-2024
Speech recognition (SR) systems such as Siri or Google Now have become an increasingly popular human-computer interaction method, and turned various into voice controllable (VCS). Prior work on attacking VCS shows that the hidden commands are incomprehensible to people can control systems. Hidden commands, though "hidden", nonetheless audible. In this work, we design a totally inaudible attack, DolphinAttack, modulates ultrasonic carriers (e.g., f > 20 kHz) achieve inaudibility. By...
Autonomous vehicles rely on sensors to measure road condition and make driving decisions, their safety relies heavily the reliability of these sensors. Out all obstacle detection sensors, ultrasonic have largest market share are expected be increasingly installed automobiles. Such discover obstacles by emitting ultrasounds analyzing reflections. By exploiting built-in vulnerabilities we designed random spoofing, adaptive jamming attacks managed trick a vehicle stop when it should keep...
To realize the efficient denitrification of low-temperature (<150 °C) flue gas in nonelectric industries, most promising strategy is to develop NH3 selective catalytic reduction (NH3–SCR) catalysts with superior activity. Conversely, low working temperature offered great flexibility for tuning calcination during catalyst manufacturing. Herein, starting Sm-doped FeMnOx catalyst, an easy but practical regulation was proposed. With increase from 300 600 °C, activity FeMnSmOx increased first and...
Voice assistants (VAs) such as Siri and Google Now have become an increasingly popular human-machine interaction method made various systems voice controllable. Prior work on attacking shows that the hidden commands are incomprehensible to people can control VAs. Hidden commands, though `hidden', nonetheless audible. In this work, we design a completely inaudible attack, DolphinAttack, modulates ultrasonic carriers achieve inaudibility. By leveraging nonlinearity of microphone circuits,...
Verifying the identity of voice inputs is important as voices are increasingly used for sensitive operations. Traditional methods focus on differentiating individuals via spectrographic features (e.g., voiceprint), yet cannot cope with spoofing attacks, whereby a malicious attacker synthesizes almost same voiceprint victim or simply replays it. This paper proposes CaField, text-independent speaker verification method to detect loudspeaker-based attacks goal achieving two seemingly...
With the widespread use of smart devices, device authentication has received much attention. One popular method for is to utilize internally-measured fingerprints, such as ID, software or hardware-based characteristics. In this paper, we propose DeMiCPU, a stimulation-response-based fingerprinting technique that relies on externally-measured information, i.e., magnetic induction (MI) signals emitted from CPU module consists chip and its affiliated power supply circuits. The key insight...
Autonomous vehicles and robots increasingly exploit LiDAR-based 3D object detection systems to detect obstacles in environment. Correct classification are important ensure safe driving. Though existing work has demonstrated the feasibility of manipulating point clouds spoof detectors, most attempts conducted digitally. In this paper, we investigate possibility physically fooling by injecting adversarial using lasers. First, develop a laser transceiver that can inject up 4200 points, which is...
Emissions of volatile organic compounds (VOCs) threaten both the environment and human health. To realize elimination VOCs, Ru/CeO
This paper investigates the problem of energy consumption in wireless sensor networks. Wireless nodes deployed harsh environment where conditions change drastically suffer from sudden changes link quality and node status. The end-to-end delay each varies due to variation On other hand, are supplied with limited it is a great concern extend network lifetime. To cope those problems, this proposes novel simple routing metric, predicted remaining deliveries (PRD), combining parameters, including...
Fake base station (FBS) crime is a type of wireless communication that has appeared recently. The key to enforcing the laws on regulating FBS based not only arrest but also convict criminals effectively. Much work discovering, localization, and tracking can assist arresting, problem collecting evidence accurately support proper conviction been addressed yet.
Autonomous vehicles increasingly exploit computer-vision-based object detection systems to perceive environments and make critical driving decisions. To increase the quality of images, image stabilizers with inertial sensors are added alleviate blurring caused by camera jitters. However, such a trend opens new attack surface. This paper identifies system-level vulnerability resulting from combination emerging stabilizer hardware susceptible acoustic manipulation algorithms subject...
IoT devices and other embedded systems are increasingly equipped with cameras that can sense critical information in private spaces.The data security of these cameras, however, has hardly been scrutinized from the hardware design perspective.Our paper presents first attempt to analyze attack surface physical-channel eavesdropping on cameras.We characterize EM Eye-a vulnerability digital image transmission interface allows adversaries reconstruct high-quality streams cameras' unintentional...
The emission of NH3 has been reported to pose a serious threat both human health and the environment. To efficiently eliminate NH3, catalysts for selective catalytic oxidation (NH3–SCO) have intensively studied. Fe2O3-based were found exhibit superior activity; however, low N2 selectivity made it less attractive in practical applications. In this work, aimed at improving on catalysts, simple SiO2 doping strategy was proposed. Although activity showed almost no change Fe2O3 after doping,...
Endometriosis is a common gynecological disorder, with rising incidence rates and decreasing age of onset, significantly affecting patients' quality life overall health. Urinary tract endometriosis (UTE) rare invasive form that often leads to urinary obstruction can even result in renal failure. The clinical significance diagnosing treating UTE increasingly recognized. However, there currently lack systematic bibliometric analysis provide an overview this field. purpose study comprehensively...
Password guessing is a crucial research direction in password security, considering vulnerabilities like reuse and data breaches. While has extensively explored intra-site guessing, the complexities of cross-site attacks, where attackers use leaked from one site to target another, remain less understood. This study investigates impact dataset feature similarity on performance, revealing that differences significantly influence success more than model variations. By analyzing eight datasets...
As renewable energy sources (RES) continue to expand and the use of power inverters has surged, have become crucial for converting direct current (DC) from RES into alternating (AC) grid, their security is vital maintaining stable grid operations. This paper investigates vulnerabilities photovoltaic (PV) inverters, specifically focusing on internal sensors, which are critical reliable conversion. It found that both voltage sensors susceptible intentional electromagnetic interference (IEMI)...