Peer-reviewed Conference Papers and Journal Papers
All papers, codes, and demos of the papers can be found at https://github.com/USSLab :)
2025
Yan Jiang, Xiaoyu Ji, Yancheng Jiang, Kai Wang, Chenren Xu, Wenyuan Xu. "PowerRadio: Manipulate Sensor Measurement via Power GND Radiation", accepted by Network and Distributed System Security (NDSS) Symposium. 2025.
Zizhi Jin, Qinhong Jiang, Xuancun Lu, Chen Yan, Xiaoyu Ji, Wenyuan Xu. " PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR", accepted by the Network and Distributed System Security Symposium (NDSS) 2025.
Yanze Ren, Qinhong Jiang, Chen Yan, Xiaoyu Ji, Wenyuan Xu. "GhostShot: Manipulating the Image of CCD Cameras with Electromagnetic Interference", accepted by the Network and Distributed System Security Symposium (NDSS) 2025.
Fengchen Yang, Wenze Cui, Xinfeng Li, Chen Yan, Xiaoyu Ji, Wenyuan Xu. "LightAntenna: Characterizing the Limits of Fluorescent Lamp-Induced Electromagnetic Interference", accepted by the Network and Distributed System Security Symposium (NDSS) 2025.
Fengchen Yang, Zihao Dan, Kaikai Pan, Chen Yan, Xiaoyu Ji, Wenyuan Xu. "ReThink: Reveal the Threat of Electromagnetic Interference on Power Inverters", accepted by the Network and Distributed System Security Symposium (NDSS) 2025.
2024
Xiaoyu Ji , Wenjun Zhu , Shilin Xiao , Wenyuan Xu, "Sensor-based IoT data privacy protection", Nature Reviews Electrical Engineering, volume 1, issue 7, pages 427-428. [PDF]
Guoming Zhang, Xiaohui Ma, Huiting Zhang, Zhijie Xiang, Xiaoyu Ji, Yanni Yang, Xiuzhen Cheng, Pengfei Hu, "LaserAdv: Laser Adversarial Attacks on Speech Recognition Systems", accepted by USENIX Security Symposium (USENIX Security), 2024.
Xinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan, Yanjiao Chen, Xiaoyu Ji, Wenyuan Xu, "SafeGen: Mitigating Sexually Explicit Content Generation in Text-to-Image Models", accepted by the Proceeding of ACM Conference on Computer and Communications Security (CCS), 2024.
Qingsong Yao, Yuming Liu, Xiongjia Sun, Xuewen Dong, Xiaoyu Ji, Jianfeng Ma, "Watch the Rhythm: Breaking Privacy with Accelerometer at the Extremely-Low Sampling Rate of 5Hz", accepted by the Proceeding of ACM Conference on Computer and Communications Security (CCS), 2024.
Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu. "Understanding and Benchmarking the Commonality of Adversarial Examples", in Proceeding of IEEE Security & Privacy (Oakland), 2024.
Xinfeng Li, Kai Li, Yifan Zheng, Chen Yan, Xiaoyu Ji, Wenyuan Xu, "SafeEar: Content Privacy-Preserving Audio Deepfake Detection", accepted by the Proceeding of ACM Conference on Computer and Communications Security (CCS), 2024.
Zizhi Jin, Xuancun Lu, Bo Yang, Yushi Cheng, Chen Yan, Xiaoyu Ji, and Wenyuan Xu, "Unity is Strength? Benchmarking the Robustness of Fusion-based 3D Object Detection against Physical Sensor Attack", ACM on Web Conference (WWW) 2024.
Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu, "CamPro: Camera-based Anti-Facial Recognition", accepted by the Network and Distributed System Security Symposium (NDSS) 2024.
Yan Long, Qinghong Jiang, Chen Yan, T. Alam, Xiaoyu Ji, Wenyuan Xu, Kevin Fu, "EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras", accepted by the Network and Distributed System Security Symposium (NDSS) 2024.
Zhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji, Wenyuan Xu, "UniID: Stealthy Spoofing Attacks against Face Authentication by Universal Identity", Minor revision, Network and Distributed System Security Symposium (NDSS) 2024.
Qinhong Jiang, Yanze Ren, Yan Long, Chen Yan, Yumai Sun, Xiaoyu Ji, Kevin Fu, Wenyuan Xu, "GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards", accepted by the Network and Distributed System Security Symposium (NDSS) 2024.
Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu, "Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time", accepted by the Network and Distributed System Security Symposium (NDSS) 2024.
Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji*, Ahmad-Reza Sadegh, Wenyuan Xu, “Analyzing and Defending GhostTouch Attack against Capacitive Touchscreens”, IEEE Transactions on Dependable and Secure Computing (TDSC), 2024.
Xiaoyu Ji, Guoming Zhang, Xinfeng Li, Gang Qu, Xiuzhen Cheng, Wenyuan Xu*, Guoming Zhang, “Detecting Inaudible Voice Commands via Acoustic Attenuation by Multi-channel Microphones”, IEEE Transactions on Dependable and Secure Computing (TDSC), 2024.
Yushi Cheng, Xiaoyu Ji∗, Wenjun Zhu, Shibo Zhang, Kevin Fu, and Wenyuan Xu, “Adversarial Computer Vision via Acoustic Manipulation of Camera Sensors”, IEEE Transactions on Dependable and Secure Computing (TDSC), 2024.
Yan Jiang, Xiaoyu Ji, JuchuanZhang, Yancheng Jiang, Shui Jiang, Wenyuan Xu, "CapSpeaker: Injecting Commands to Voice Assistant via Capacitors", accepted by IEEE Transactions on Dependable and Secure Computing (TDSC).
Yan Jiang, Xiaoyu Ji, Kai Wang, Chen Yan, Richard Mitev, Ahmad-Reza Sadeghi, Wenyuan Xu, "Marionette: Manipulate Your Touchscreen via A Charging Cable", accepted by IEEE Transactions on Dependable and Secure Computing (TDSC).
Jiangyi Deng, Xiaoyu Ji, Beibei Wang, Bin Wang, Wenyuan Xu, "Dr. Defender: Proactive Detection of Autopilot Drones based on CSI", accepted by IEEE Transactions on Information Forensics and Security (TIFS).
2023
Shilin Xiao, Xiaoyu Ji, Zhicong Zheng, Chen Yan, Wenyuan Xu, "MicPro: Microphone-based Voice Privacy Protection", accepted by the Proceeding of ACM Conference on Computer and Communications Security (CCS), 2023.
Kai Wang, Shilin Xiao, Xiaoyu Ji, Chen Yan*, Chaohao Li, Wenyuan Xu, “Volttack: Control IoT Devices by Manipulating Power Supply Voltage”, in Proceeding of IEEE Security & Privacy (Oakland), 2023.
Zhihao Wu, Yushi Cheng, Jiahui Yang, Xiaoyu Ji*, Wenyuan Xu*, "DepthFake: Spoofing 3D Face Authentication with a 2D Photo", accepted by IEEE Security & Privacy (Oakland), 2023.
Zizhi Jin, Xiaoyu Ji, Yushi Cheng, Bo Yang, Chen Yan, Wenyuan Xu, "PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle", accepted by IEEE Security & Privacy (Oakland), 2023. [PDF]
Ruochen Zhou, Xiaoyu Ji*, Chen Yan, Yi-Chao Chen, Chaohao Li, Wenyuan Xu, "DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation", accepted by IEEE Security & Privacy (Oakland), 2023.
Shibo Zhang, Yushi Cheng, Wenjun Zhu, Xiaoyu Ji, Wenyuan Xu, "CAPatch: Physical Adversarial Patch against Image Captioning Systems", accepted by USENIX Security Symposium (USENIX Security), 2023.
Wenjun Zhu, Xiaoyu Ji*, Yushi Cheng, Shibo Zhang, Wenyuan Xu, "TPatch: A Triggered Physical Adversarial Patch", accepted by USENIX Security Symposium (USENIX Security), 2023.
Qinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou, Wenyuan Xu,"GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI", accepted by USENIX Security Symposium (USENIX Security), 2023.
Xinfeng Li, Xiaoyu Ji, Chen Yan, Chaohao Li, Yichen Li, Zhenning Zhang, Wenyuan Xu,"Learning Normality is Enough: A Software-based Mitigation against the Inaudible Voice Attacks", accepted by USENIX Security Symposium (USENIX Security), 2023.
Xinqi Chen, Leping Yang, Yijie Li, Qianfei Ren, Yi-Chao Chen, Guangtao Xue, Xiaoyu Ji, "Remote Attacks on Speech Recognition Systems Using Sound from Power Supply", accepted by USENIX Security Symposium (USENIX Security), 2023.
Zhixin Xie, Chen Yan, Xiaoyu Ji, Wenyuan Xu, "BitDance: Manipulating UART Serial Communication with IEMI", accepted by the International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), 2023.
Zhicong Zheng, Xinfeng Li, Chen Yan, Xiaoyu Ji, Wenyuan Xu, "The Silent Manipulator: A Practical and Inaudible Backdoor Attack against Speech Recognition Systems". accepted by the the 31st ACM International Conference on Multimedia (ACM MM), 2023.
Xiaoyu Ji, Qinhong Jiang, Chaohao Li, Zhuoyang Shi, and Wenyuan Xu*, “Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification”, IEEE Transactions on Information Forensics and Security (TIFS), 2023.
Chen Yan, Xiaoyu Ji*, Kai Wang, Qinhong Jiang, Zizhi Jin, Wenyuan Xu, "A Survey on Voice Assistant Security: Attacks and Countermeasures", published in ACM Computing Surveys (ACM CSUR).
Xiaoyu Ji, Juchuan Zhang, Shan Zou, Yi-Chao Chen, Gang Qu, Wenyuan Xu, "MagView++: Data Exfiltration via CPU Magnetic Signals Under Video Decoding", accepted by IEEE Transactions on Mobile Computing (TMC), 2023
Xuiaoy Ji, Guoming Zhang, Donglian Qi, Wenyuan Xu*, “Ultrasound Communication Using the Nonlinearity Effect of Microphone Circuits in Smart Devices”, ACM Transactions on Sensor Networks (ToSN), 2023.
Yanjiao Chen , Yushi Cheng , Xiaoyu Ji* , Boyang Zhou , Wenyuan Xu , Fei Teng, "PDGes: An Interpretable Detection Model for Parkinson’s Disease Using Smartphones", accepted by ACM Transactions on Sensor Networks (ToSN), 2023.
Wenyuan Xu, Yushi Cheng, Xiaoyu Ji, Yi-Chao Chen, "On Tracing Screen Photos ? A Moiré Pattern-based Approach", accepted by IEEE Transactions on Dependable and Secure Computing (TDSC), 2023.
Xinfeng Li, Zhicong Zheng, Chen Yan, Chaohao Li, Xiaoyu Ji, Wenyuan Xu, "Towards Pitch-Insensitive Speaker Verification via Soundfield", accepted by IEEE Internet of Things Journal (IoTJ), 2023.
Xinfeng Li, Junning Ze, Chen Yan*, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu “Enrollment-stage backdoor attacks on speaker recognition systems via adversarial ultrasound”, IEEE Internet of Things Journal (IoTJ), 2023.
Jiangyi Deng, Xiaoyu Ji, Beibei Wang, Bin Wang, Wenyuan Xu*, Dr. Defender: Proactive Detection of Autopilot Drones based on CSI, IEEE Transactions on Information Forensics and Security (TIFS), 2023.
2022
Yan Jiang, Xiaoyu Ji*, Kai Wang, Chen Yan, Richard Mitev (Technische University of Darmstadt), Ahmad-Reza Sadeghi, Wenyuan Xu*, "WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens", in IEEE Security & Privacy (Oakland), 2022.
Ruiwen He, Xiaoyu Ji*, Xinfeng Li, Yushi Cheng, Wenyuan Xu, "OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score", accepted by the 31stt USENIX Security Symposium (USENIX Security), 2022.
Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji*, Ahmad-Reza Sadeghi, and Wenyuan Xu, "GhostTouch: Targeted Attacks on Touchscreens without Physical Touch", accepted by the 31stt USENIX Security Symposium (USENIX Security), 2022.
Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji*, and Wenyuan Xu, "Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition", accepted by the 31stt USENIX Security Symposium (USENIX Security), 2022.
Hao Pan, Feitong Tan, Yi-Chao Chen, Gaoang Huang, Qingyang Li, Wenhao Li, Guangtao Xue, Lili Qiu, Xiaoyu Ji, "DoCam: depth sensing with an optical image stabilization supported RGB camera", In the Proceeding of ACM Annual International Conference on Mobile Computing and Networking (MobiCom), 2022.
Jiayu Zhang, Min Li, Min-Jian Zhao, Xiaoyu Ji, Wenyuan Xu, "Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication", published on IEEE Transactions on Information Forensics and Security (TIFS), 2022.
Guangtao Xue, Yijie Li, Hao Pan, Lanqing Yang, Yi-Chao Chen, Xiaoyu Ji, Jiadi Yu, "ScreenID: Enhancing QRCode Security by Utilizing Screen Dimming Feature", published in ACM Transactions on Networking (ToN), 2022.
Hao Pan, Feitong Tan, Wenhao Li, Yi-Chao Chen, Lanqing Yang, Guangtao Xue, Xiaoyu Ji, "MagDefender: Detecting Eavesdropping on Mobile Devices using the Built-in Magnetometer", published in IEEE International Conference on Sensing, Communication, and Networking (SECON), 2022.
2021
Xiaoyu Ji, Juchuan Zhang, Shui Jiang, Jishen Li, and Wenyuan Xu, "CapSpeaker: Injecting Sounds to Microphones via Capacitors", In the Proceeding of ACM Conference on Computer and Communications Security (CCS), 2021.
Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, Kevin Fu, "Poltergeist: Acoustic Manipulation of Image Stabilization towards Object Mis-Labeling", accepted by IEEE Security & Privacy (Oakland) 2021 (acceptance ratio: 12.1%). Project site: https://github.com/USSLab/PoltergeistAttack
Xiaoyu Ji, Yushi Cheng, Wenyuan Xu, Yuehan Chi, Hao Pan, Zhuangdi Zhu, Chuang-Wen You, Yi-Chao Chen, Lili Qiu, "No Seeing is Also Believing: Electromagnetic-emission-based Application Guessing Attacks via Smartphones", accepted by IEEE Transactions on Mobile Computing (TMC).
Xiaoyu Ji, Yushi Cheng, Juchuan Zhang, Yuehan Chi, Wenyuan Xu, Yi-Chao Chen, "Device fingerprinting with magnetic induction signals radiated by CPU modules", accepted by ACM Transactions on Sensor Networks (ToSN).
Yushi Cheng, Xiaoyu Ji*, Lixu Wang, Qi Pang, Yi-Chao Chen, Wenyuan Xu, mID: Tracing Screen Photos via Moiré Patterns, accepted by the 30th USENIX Security Symposium (USENIX Security) 2021.
Guoming Zhang, Xiaoyu Ji*, Xinfeng Li, Gang Qu, Wenyuan Xu, "EarArray: Defending against Dolphinattacks via Acoustic Attenuation", accepted by the Network and Distributed System Security Symposium (NDSS) 2021.
Juchuan Zhang, Xiaoyu Ji, Yuehan Chi, Yi-chao Chen, Bin Wang, Wenyuan Xu, "OutletSpy: cross-outlet application inference via power factor correction signal", in ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2021.
Weizhao Jin, Xiaoyu Ji*, Ruiwen He, Zhou Zhuang, Wenyuan Xu, Yuan Tian, "SMS Goes Nuclear: Fortifying SMS-Based MFA in Online Account Ecosystem", published on Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W) 2021.
Chaohao Li, Xiaoyu Ji*, Bin Wang, Kai Wang, Wenyuan Xu, "SenCS: Enabling Real-time Indoor Proximity Verification via Contextual Similarity Authors", accepted by ACM Transactions on Sensor Networks (ToSN).
Guangtao Xue, Hao Pan, Yi-Chao Chen, Xiaoyu Ji, Jiadi Yu, "MagneComm+: Near-Field Electromagnetic Induction Communication with Magnetometer", accepted by Transactions on Mobile Computing (TMC).
Hao Pan, Lanqing Yang, Honglu Li, Chuang-Wen You, Xiaoyu Ji, Yi-Chao Chen, Zhenxian Hu, Guangtao Xue, "MagThief: Stealing Private App Usage Data on Mobile Devices via Built-in Magnetometer", in IEEE International Conference on Sensing, Communication, and Networking (SECON), 2021.
Yijie Li,Yi-Chao Chen, Xiaoyu Ji, Hao Pan, Lanqing Yang, Guangtao Xue and Jiadi Yu, "ScreenID: Enhancing QRCode Security by Fingerprinting Screens", accepted by IEEE Conference on Computer Communications (INFOCOM) 2021.
2020
Xiaoyu Ji, Xinyan Zhou, Chen Yan, Jiangyi Deng, Wenyuan Xu, "A Nonlinearity-based Secure Face-to-Face Device Authentication for Mobile Devices", accepted by IEEE Transactions on Mobile Computing (TMC).
Xiaoyu Ji, Xinyan Zhou, Miao Xu, Wenyuan Xu and Yabo Dong, "OPCIO: Optimizing Power Consumption for Embedded Devices via GPIO Configuration", ACM Transactions on Sensor Networks (TOSN), accepted, Jan., 2020.
Xiaoyu Ji, Chaohao Li, Xinyan Zhou, Juchuan Zhang, and Wenyuan Xu, "Authenticating Smart Home Devices via Home Limited Channels", accepted by IEEE Transactions on Internet of Things (TIoT).
Yushi Cheng, Xiaoyu Ji*, Xiaopeng Li, Tianchen Zhang, Sharaf Malebary, Xianshan Qu, W XuIdentifying child users via touchscreen interactions ACM Transactions on Sensor Networks (TOSN).
Juchuan Zhang, Xiaoyu Ji*, Wenyuan Xu, Yi-Chao Chen, Yuting Tang, Gang Qu, "MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding", accepted by IEEE Conference on Computer Communications (INFOCOM) 2020.
Jiayu Zhang, Zhiyun Wang, Xiaoyu Ji*, Wenyuan Xu, Gang Qu, and Minjian Zhao, "Who Is Charging My Phone? Identifying Wireless Chargers via Fingerprinting", accepted by IEEE Internet of Things Journal (IoTJ).
Yijie Li, Yi-Chao Chen, Xiaoyu Ji, Hao Pan, Lanqing Yang, Guangtao Xue, Jiadi Yu, "Toward a Secure QR Code System by Fingerprinting Screens", accepted by Proceedings of the 26th Annual International Conference on Mobile Computing and Networking (Poster, Mobicom).
2019
Guoming Zhang, Xiaoyu Ji*, Xinyan Zhou, Donglian Qi, and Wenyuan XU, "Ultracom: High-speed and Inaudible Acoustic Communication", in Proceedings of EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine) 2019. (Best Paper Award)
Chen Yan, Yan Long, Xiaoyu Ji*, Wenyuan Xu*, "Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification", In the Proceeding of ACM Conference on Computer and Communications Security (CCS), 2019. (acceptance ratio: 10%).
Hao Pan, Lanqing Yang, Yi-Chao Chen, Guangtao Xue, Chuangwen You, Xiaoyu Ji, "mQRCode: Secure QR Code Using Nonlinearity of Spatial Frequency in Light", In the Proceeding of ACM Annual International Conference on Mobile Computing and Networking (MobiCom), 2019.
Yushi Cheng, Xiaoyu Ji*, Wenyuan Xu, Yichao Chen, "DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU", In the Proceeding of ACM Conference on Computer and Communications Security (CCS), 2019. (acceptance ratio: 16%).
Yushi Cheng, Xiaoyu Ji*, Wenyuan Xu, Hao Pan, Zhuangdi Zhu, Chuang-Wen You, Yi-Chao Chen, Lili Qiu, "MagAttack: Guessing Application Launching and Operation via Smartphone", in ACM Asia Conference on Computer and Communications Security (ASIACCS) 2019. (acceptance ratio: 22%).
Xinyan Zhou, Xiaoyu Ji*, Chen Yan, Jiangyi Deng, Wenyuan Xu, "NAuth: Secure Face-to-Face Device Authentication via Nonlinearity", In the Proceeding of IEEE Conference on Computer Communications (INFOCOM), 2019. (acceptance rate 19.7% )
Yushi Cheng, Xiaoyu Ji, Tianyang Lu and Wenyuan Xu, "On Detecting Hidden Wireless Cameras: A Traffic Pattern-based Approach", IEEE Transactions on Mobile Computing (TMC), accepted, Feb, 2019.
Chen Yan, Guoming Zhang, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu, "The feasibility of injecting inaudible voice commands to voice assistants", IEEE Transactions on Dependable and Secure Computing (TDSC), published, Mar., 2019.
Daibo Liu, Zhichao Cao, Yuan He, Xiaoyu Ji, Mengshu Hou, Hongbo Jiang, "Exploiting Concurrency for Opportunistic Forwarding in Duty-Cycled IoT Networks", ACM Transactions on Sensor Networks (TOSN), published, May, 2019.
2018
Xiaoyu Ji, Yushi Cheng, Wenyuan Xu, and Xinyan Zhou, "User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes", Security and Communication Networks (SCN), 2018, published, Sep., 2018.
Wenyuan Xu, Chen Yan, Weibin Jia, Xiaoyu Ji*, Jianhao Liu, "Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles", IEEE Internet of Things Journal, published, Aug, 2018. (*Corresponding author)
Yushi Cheng, Xiaoyu Ji*, Tianyang Lu and Wenyuan Xu, "DeWiCam: Detecting Hidden Wireless Cameras via Smartphones", in ACM Asia Conference on Computer and Communications Security (ASIACCS) 2018. (acceptance ratio: 20%)
Xinyan Zhou, Xiaoyu Ji*, Bin Wang, Yushi Cheng, Zhuoran Ma, Francis Choi, Brian Helmuth and Wenyuan Xu, "Pido: Predictive Delay Optimization for Intertidal Wireless Sensor Networks", in Sensors (IF=2.677), published, May, 2018. (*Corresponding author)
Xinyan Zhou, Xiaoyu Ji*, Yi-Chao Chen, Xiaopeng Li and Wenyuan Xu, "LESS: Link Estimation with Sparse Sampling in Intertidal WSNs", in Sensors (IF=2.677), published, Mar., 2018. (*Corresponding author)
Xiaohan Lai, Xiaoyu Ji*, Xinyan Zhou and Longdao Chen, "Energy Efficient Link-Delay Aware Routing in Wireless Sensor Networks", IEEE Sensors Journal (IF=2.512), published, Nov., 2018. (*Corresponding author)
Wei Gong, Haoxiang Liu, Jiangchuan Liu, Xiaoyi Fan, Kebin Liu, Qiang Ma and Xiaoyu Ji, "Channel-Aware Rate Adaptation for Backscatter Networks", IEEE Transactions on Networking (ToN), published, Feb., 2018.
Zhou Zhuang, Xiaoyu Ji*, Taimin Zhang, Juchuan Zhang, Zhenhua Li, Yunhao Liu, Wenyuan Xu, "FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting", in ACM Asia Conference on Computer and Communications Security (ASIACCS) 2018. (acceptance ratio: 20%)
Chaohao Li, Xiaoyu Ji*, Xinyan Zhou, Juchuan Zhang, Jing Tian, Yanmiao Zhang and Wenyuan Xu, "HlcAuth: Key-free and Secure Communications via Home-Limited Channel", in ACM Asia Conference on Computer and Communications Security (ASIACCS) 2018. (acceptance ratio: 20%)
Yushi Cheng, Xiaoyu Ji*, Xinyan Zhou and Wenyuan Xu, "HomeSpy: Inferring User Presence via Encrypted Traffic of Home Surveillance Camera", The 1st International Workshop on Wireless Sensing Technology (ICPASDS WST) , 2018. (acceptance ratio: 18%) (Best Paper Runner-up Award)
Xiaopeng Li, Sharaf Malebary, Xianshan Qu, Xiaoyu Ji, Yushi Cheng, and Wenyuan Xu, "iCare: Automatic and User-friendly Children Identification on Smartphones", In The 19th International Workshop on Mobile Computing Systems and Applications (HotMobile), 2018. (acceptance ratio: 18%) [PDF] [Slides] [Bibtex]
2017
Guoming Zhang, Chen Yan, Xiaoyu Ji*, Tianchen Zhang, Taimin Zhang and Wenyuan Xu*, "DolphinAttack: Inaudible Voice Commands", In the Proceeding of ACM Conference on Computer and Communications Security (CCS), 2017. (acceptance ratio: 18%) (*Corresponding author) (Best Paper Award, 国内首次) [PDF] [Slides] [Bibtex]
Hao Pan, Yi-Chao Chen, Guangtao Xue and Xiaoyu Ji, "MagneComm: Magnetometer-based Near-Field Communication", In the Proceeding of ACM Annual International Conference on Mobile Computing and Networking (MobiCom), 2017. (acceptance ratio: 19.4%) [PDF] [Slides] [Bibtex]
Taimin Zhang, Xin Lu, Xiaoyu Ji, Wenyuan Xu, "An identity-based secure communication scheme for advanced metering infrastructure in smart grid", in IEEE 29th Chinese Control And Decision Conference (CCDC), 2017.
Zhuoran Ma, Xinyan Zhou, Xuan Ouyang,Xiaoyu Ji, Wenyuan Xu, "A robust backup routing protocol for neighbor area network in the smart grid", in IEEE 9th International Conference on Wireless Communications and Signal Processing (WCSP) , 2017.
Xiaohan Lai, Miao Xu, Xiaoyu Ji, Wenyuan Xu, Longdao Chen, "En-MAC: Environment-aware MAC protocol for WSNs in intertidal environment", in IEEE 9th International Conference on Wireless Communications and Signal Processing (WCSP) , 2017.
2016
Xiaoyu Ji, Yuan He, Jiliang Wang, Kaishun Wu, Daibo Liu, Ke Yi, and Yunhao Liu, "On Improving Wireless Channel Utilization: A Collision Tolerance-based Approach", IEEE Transactions on Mobile Computing (TMC), published, May, 2016.
Yi Zhang, Jiliang Wang, Xiaoyu Ji, Daibo Li and Bo Li, "Furion: Towards Energy-Efficient WiFi Offloading under Link Dynamics",In the Proceedings of IEEE International Conference on Sensing, Communication and Networking (SECON), 2016.
Zhuangdi Zhu, Hao Pan, Yi-Chao Chen, Xiaoyu Ji, Fan Zhang, Chuang-Wen You, "MagAttack: Remote App Sensing with Your Phone" . In ACM Ubicomp/ISWC Poster, 2016.
2015
Xiaoyu Ji, Jiliang Wang, Mingyan Liu, Yubo Yan, Panlong Yang, and Yunhao Liu, "Hitchhike: A Preamble-based Control Plane for SNR-sensitive Wireless Networks", IEEE Transactions on Wireless Communications (TWC), published, Oct., 2015.
Xi Chen, Xiaopei Wu, Xiangyang Li, Xiaoyu Ji, Yuan He and Yunhao Liu, "Privacy-aware High-quality Map Generation with Participatory Sensing", IEEE Transactions on Mobile Computing (TMC), published, Apr. 2015.
Daibo Liu, Mengshu Hou, Zhichao Cao, Yuan He, Xiaoyu Ji, and Xiaolong Zheng, "COF: Exploiting Concurrency for Low Power Opportunistic Forwarding", In the Proceedings of IEEE International Conference on Network Protocols (ICNP), 2015.
Daibo Liu, Zhichao Cao, Xiaopei Wu, Yuan He, Xiaoyu Ji and Mengshu Hou, "TeleAdjusting: Using Path Coding and Opportunistic Forwarding for Remote Control in WSNs", In the Proceeding of IEEE International Conference on Distributed Computing Systems (ICDCS), 2015.
2014 and before
Xiaoyu Ji, Jiliang Wang, Mingyan Liu, Yubo Yan, Panlong Yang, and Yunhao Liu, "Hitchhike: Riding Control on Preambles", In the Proceeding of IEEE Conference on Computer Communications (INFOCOM), 2014. (acceptance ratio: 19.4%)
Xiaoyu Ji, Yuan He, Jiliang Wang, Wei Dong, Xiaopei Wu, and Yunhao Liu, "Walking down the STAIRS: Efficient Collision Resolution in Wireless Sensor Networks", In the Proceeding of IEEE Conference on Computer Communications (INFOCOM), 2014. (acceptance Rate: 19.4%)
Weixi Gu, Zheng Yang, Longfei Shangguan, Xiaoyu Ji, and Yiyang Zhao, "ToAuth: Towards Automatic Near Field Authentication for Smartphones", In the Proceedings of IEEE International Conference on Trust, Security, and Privacy in Coumputing and Communications (TrustCom), 2014. (Best Paper Award)
Xiaoyu Ji, Yuan He, Jiliang Wang, Kaishun Wu, Ke Yi, and Yunhao Liu, "Voice over the Dins: Improving Wireless Channel Utilization with Collision Tolerance", In the Proceedings of IEEE International Conference on Network Protocols (ICNP), 2013. (acceptance ratio: 18%) [PDF] [Slides] [Bibtex]
Lining Yao, Yan Shi, Hengfeng Chi, Xiaoyu Ji, and Fangtian Ying, "Music-touch shoes: vibrotactile interface for hearing impaired dancers", In the Proceedings of International Conference on Tangible, Embedded, and Embodied Interaction (TEI), 2010.