CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition Y X, C Y, Z Y, L Y, L X, C K, Z S, H H, W XF, G CA 27th USENIX Security Symposium (USENIX Security 18), 2018 | 227* | 2018 |
Seeing isn't believing: Towards more robust adversarial attack against real world object detectors Y Zhao, H Zhu, R Liang, Q Shen, S Zhang, K Chen Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 145* | 2019 |
Trustshadow: Secure execution of unmodified applications with arm trustzone L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017 | 141 | 2017 |
Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices. Y Chen, X Yuan, J Zhang, Y Zhao, S Zhang, K Chen, XF Wang USENIX Security Symposium, 2667-2684, 2020 | 93 | 2020 |
Machine learning based cross-site scripting detection in online social network R Wang, X Jia, Q Li, S Zhang 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 …, 2014 | 38 | 2014 |
All your alexa are belong to us: A remote voice control attack against echo X Yuan, Y Chen, A Wang, K Chen, S Zhang, H Huang, IM Molloy 2018 IEEE global communications conference (GLOBECOM), 1-6, 2018 | 34 | 2018 |
A comprehensive study of co-residence threat in multi-tenant public paas clouds W Zhang, X Jia, C Wang, S Zhang, Q Huang, M Wang, P Liu Information and Communications Security: 18th International Conference …, 2016 | 21 | 2016 |
Cross-layer damage assessment for cyber situational awareness P Liu, X Jia, S Zhang, X Xiong, YC Jhi, K Bai, J Li Cyber Situational Awareness: Issues and Research, 155-176, 2010 | 18 | 2010 |
Building a trustworthy execution environment to defeat exploits from both cyber space and physical space for ARM L Guan, C Cao, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger IEEE Transactions on Dependable and Secure Computing 16 (3), 438-453, 2018 | 16 | 2018 |
HyperCrop: a hypervisor-based countermeasure for return oriented programming J Jiang, X Jia, D Feng, S Zhang, P Liu Information and Communications Security: 13th International Conference …, 2011 | 16 | 2011 |
Fast recovery from hidden node collision for IEEE 802.15. 4 LR-WPANs S Zhang, SJ Yoo 7th IEEE International Conference on Computer and Information Technology …, 2007 | 13 | 2007 |
LeakProber: a framework for profiling sensitive data leakage paths J Yu, S Zhang, P Liu, ZT Li Proceedings of the first ACM conference on Data and application security and …, 2011 | 12 | 2011 |
Cross-layer comprehensive intrusion harm analysis for production workload server systems S Zhang, X Jia, P Liu, J Jing Proceedings of the 26th Annual Computer Security Applications Conference …, 2010 | 12 | 2010 |
Defending return‐oriented programming based on virtualization techniques X Jia, R Wang, J Jiang, S Zhang, P Liu Security and Communication Networks 6 (10), 1236-1249, 2013 | 11 | 2013 |
Distributed workload and response time management for web applications S Zhang, H Wu, W Wang, B Yang, P Liu, AV Vasilakos 2011 7th International Conference on Network and Service Management, 1-9, 2011 | 11 | 2011 |
Sok: A modularized approach to study the security of automatic speech recognition systems Y Chen, J Zhang, X Yuan, S Zhang, K Chen, X Wang, S Guo ACM Transactions on Privacy and Security 25 (3), 1-31, 2022 | 10 | 2022 |
Using virtual machines to do cross-layer damage assessment X Jia, S Zhang, J Jing, P Liu Proceedings of the 1st ACM workshop on Virtual machine security, 29-38, 2008 | 9 | 2008 |
Towards transparent and distributed workload management for large scale web servers S Zhang, W Wang, H Wu, AV Vasilakos, P Liu Future Generation Computer Systems 29 (4), 913-925, 2013 | 8 | 2013 |
Dbia: Data-free backdoor injection attack against transformer networks P Lv, H Ma, J Zhou, R Liang, K Chen, S Zhang, Y Yang arXiv preprint arXiv:2111.11870, 2021 | 7 | 2021 |
Ai-lancet: Locating error-inducing neurons to optimize neural networks Y Zhao, H Zhu, K Chen, S Zhang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 7 | 2021 |