- User Authentication and Security Systems
- Biometric Identification and Security
- Advanced Malware Detection Techniques
- IoT and GPS-based Vehicle Safety Systems
- Bluetooth and Wireless Communication Technologies
- Parallel Computing and Optimization Techniques
- Internet Traffic Analysis and Secure E-voting
- Antenna Design and Analysis
- Physical Unclonable Functions (PUFs) and Hardware Security
- Face recognition and analysis
- Chaos-based Image/Signal Encryption
- Digital Media Forensic Detection
- Cryptographic Implementations and Security
- Gait Recognition and Analysis
Zhejiang University
2022-2024
Zhejiang University of Science and Technology
2021-2022
Face authentication (FA) schemes are universally adopted. However, current FA systems mainly camera-based and hence susceptible to face occlusion (e.g., facial masks) vulnerable spoofing attacks 3D-printed masks). This paper exploits the penetrability, material sensitivity, fine-grained sensing capability of millimeter wave (mmWave) build an anti-spoofing system, named mmFace. It scans human by moving a commodity off-the-shelf (COTS) mmWave radar along specific trajectory. The signals...
Biometric plays an important role in user authentication. However, the most widely used biometrics, such as facial feature and fingerprint, are easy to capture or record, thus vulnerable spoofing attacks. On contrary, intracorporal electrocardiography electroencephalography, hard collect, hence more secure for Unfortunately, adopting them is not user-friendly due their complicated collection methods inconvenient constraints on users. In this paper, we propose a novel biometric-based...
Biometric plays an important role in user authentication. However, the most widely used biometrics, such as facial feature and fingerprint, are easy to capture or record, thus vulnerable spoofing attacks. On contrary, intracorporal electrocardiography electroencephalography, hard collect, hence more secure for Unfortunately, adopting them is not user-friendly due their complicated collection methods inconvenient constraints on users. In this paper, we propose a novel biometric-based...
Mouse is a ubiquitous input tool crucial for user-computer interaction in modern society. However, the inherent trust mouse may pose security risks. If maliciously manipulated, connected computer could be secretly controlled, endangering personal privacy and property. In this paper, we introduce PuppetMouse, first intentional electromagnetic interference (IEMI) injection-based attack that can effectively manipulate clicks movements without physical contact. By adjusting parameters of IEMI...