Follow
Chaohao Li
Chaohao Li
Hangzhou Hikvision Digital Technology Co., Ltd.
Verified email at zju.edu.cn
Title
Cited by
Cited by
Year
Blue note: How intentional acoustic interference damages availability and integrity in hard disk drives and operating systems
C Bolton, S Rampazzi, C Li, A Kwong, W Xu, K Fu
2018 IEEE Symposium on Security and Privacy (SP), 1048-1062, 2018
472018
HlcAuth: Key-free and secure communications via home-limited channel
C Li, X Ji, X Zhou, J Zhang, J Tian, Y Zhang, W Xu
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
132018
Authenticating smart home devices via home limited channels
X Ji, C Li, X Zhou, J Zhang, Y Zhang, W Xu
ACM Transactions on Internet of Things 1 (4), 1-24, 2020
72020
Sencs: Enabling real-time indoor proximity verification via contextual similarity
C Li, X Ji, B Wang, K Wang, W Xu
ACM Transactions on Sensor Networks (TOSN) 17 (2), 1-22, 2021
62021
Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks
X Li, X Ji, C Yan, C Li, Y Li, Z Zhang, W Xu
USENIX Security, 2023
52023
Volttack: Control IoT devices by manipulating power supply voltage
K Wang, S Xiao, X Ji, C Yan, C Li, W Xu
2023 IEEE Symposium on Security and Privacy (SP), 1771-1788, 2023
22023
DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation
R Zhou, X Ji, C Yan, YC Chen, W Xu, C Li
2023 IEEE Symposium on Security and Privacy (SP), 3113-3128, 2023
22023
Anti-replay: A fast and lightweight voice replay attack detection system
Z Shi, C Li, Z Jin, W Sun, X Ji, W Xu
2021 IEEE 27th International Conference on Parallel and Distributed Systems …, 2021
22021
Towards Pitch-Insensitive Speaker Verification via Soundfield
X Li, Z Zheng, C Yan, C Li, X Ji, W Xu
IEEE Internet of Things Journal, 2023
12023
VarASV: Enabling pitch-variable automatic speaker verification via multi-task learning
Y Gao, X Li, C Li, W Sun, X Ji, W Xu
2021 IEEE 5th Conference on Energy Internet and Energy System Integration …, 2021
12021
Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification
X Ji, Q Jiang, C Li, Z Shi, W Xu
IEEE Transactions on Information Forensics and Security, 2024
2024
基于剪枝技术和鲁棒蒸馏融合的轻量对抗攻击防御方法
王滨, 李思敏, 钱亚冠, 张君, 李超豪, 朱晨鸣, 张鸿飞
网络与信息安全学报 8 (6), 102-109, 2022
2022
物联网邻近交互安全关键技术研究
李超豪
浙江大学, 2021
2021
HlcAuth
C Li, X Ji, X Zhou, J Zhang, J Tian, Y Zhang, W Xu
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
2018
Poster: Blue Note-How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems
C Bolton, S Rampazzi, C Li, A Kwong, W Xu, K Fu
The system can't perform the operation now. Try again later.
Articles 1–15