Zhongjie Ba

Orcid: 0000-0003-0921-8869

According to our database1, Zhongjie Ba authored at least 52 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception.
IEEE Trans. Inf. Forensics Secur., 2024

MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning.
IEEE Trans. Dependable Secur. Comput., 2024

UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations.
IEEE Trans. Dependable Secur. Comput., 2024

Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection.
CoRR, 2024

Phoneme-Based Proactive Anti-Eavesdropping with Controlled Recording Privilege.
CoRR, 2024

Conan's Bow Tie: A Streaming Voice Conversion for Real-Time VTuber Livestreaming.
Proceedings of the 29th International Conference on Intelligent User Interfaces, 2024

Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., March, 2023

AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake.
IEEE Trans. Inf. Forensics Secur., 2023

Device-Independent Smartphone Eavesdropping Jointly Using Accelerometer and Gyroscope.
IEEE Trans. Dependable Secur. Comput., 2023

VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2023

FLTracer: Accurate Poisoning Attack Provenance in Federated Learning.
CoRR, 2023

SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution.
CoRR, 2023

Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks.
CoRR, 2023

Masked Diffusion Models are Fast Learners.
CoRR, 2023

Transferring Audio Deepfake Detection Capability across Languages.
Proceedings of the ACM Web Conference 2023, 2023

MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Locate and Verify: A Two-Stream Network for Improved Deepfake Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Is Imitation All You Need? Generalized Decision-Making with Dual-Phase Training.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Shift to Your Device: Data Augmentation for Device-Independent Speaker Verification Anti-Spoofing.
Proceedings of the IEEE International Conference on Acoustics, 2023

FITS: Matching Camera Fingerprints Subject to Software Noise Pollution.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

CamRadar: Hidden Camera Detection Leveraging Amplitude-modulated Sensor Images Embedded in Electromagnetic Emanations.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

MobiScan: An enhanced invisible screen-camera communication system for IoT applications.
Trans. Emerg. Telecommun. Technol., 2022

Masked Autoencoders for Egocentric Video Understanding @ Ego4D Challenge 2022.
CoRR, 2022

Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples.
CoRR, 2022

Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

A non-intrusive and adaptive speaker de-identification scheme using adversarial examples.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

mmPhone: Acoustic Eavesdropping on Loudspeakers via mmWave-characterized Piezoelectric Effect.
Proceedings of the IEEE INFOCOM 2022, 2022

InertiEAR: Automatic and Device-independent IMU-based Eavesdropping on Smartphones.
Proceedings of the IEEE INFOCOM 2022, 2022

PhoneyTalker: An Out-of-the-Box Toolkit for Adversarial Example Attack on Speaker Recognition.
Proceedings of the IEEE INFOCOM 2022, 2022

ActListener: Imperceptible Activity Surveillance by Pervasive Wireless Infrastructures.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Poster: Cryptographic Inferences for Video Deep Neural Networks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2021

Wavoice: A Noise-resistant Multi-modal Speech Recognition System Fusing mmWave and Audio Signals.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021

PassFace: Enabling Practical Anti-Spoofing Facial Recognition with Camera Fingerprinting.
Proceedings of the ICC 2021, 2021

2020
Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Accelerometer-based smartphone eavesdropping.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020

2019
Toward Hardware-Rooted Smartphone Authentication.
IEEE Wirel. Commun., 2019

CIM: Camera in Motion for Smartphone Authentication.
IEEE Trans. Inf. Forensics Secur., 2019

Automating CSI Measurement with UAVs: from Problem Formulation to Energy-Optimal Solution.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

CFP: Enabling Camera Fingerprint Concealment for Privacy-Preserving Image Sharing.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

2018
ABC: Enabling Smartphone Authentication with Built-in Camera.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Defending against Speaker Fingerprinting Based Device Tracking for Smartphones.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Addressing Smartphone-Based Multi-factor Authentication via Hardware-Rooted Technologies.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
Constructing authentication web in cloud computing.
Secur. Commun. Networks, 2016

My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Resource Constrained Data Stream Clustering with Concept Drifting for Processing Sensor Data.
Int. J. Data Warehous. Min., 2015

2013
On the Construction of Trusted Resource Pool in Clouds.
Proceedings of the 2013 10th Web Information System and Application Conference, 2013

Contructing Authentication Web in Cloud Computing.
Proceedings of the 2013 International Conference on Cloud and Service Computing, 2013


  Loading...