Zhejiang University

General Info

Rank: #33 Worldwide
#3 outside of US and Europe
Papers: 78
Number of Researchers: 115
APA
(average papers per authors):
0.7
Country: CHINA

Activity Map

Contributors

  • Shouling Ji (26 papers)
  • Wenyuan Xu (19 papers)
  • Xiaoyu Ji (11 papers)
  • Kui Ren (9 papers)
  • Yajin Zhou (9 papers)
  • Xuhong Zhang (8 papers)
  • Chen Yan (7 papers)
  • Jinfeng Li (4 papers)
  • Tianyu Du (3 papers)
  • Zhan Qin (3 papers)
  • Feng Lin (3 papers)
  • Yanjiao Chen (3 papers)
  • Chenyang Lyu (3 papers)
  • Chunming Wu (3 papers)
  • Yushi Cheng (3 papers)
  • Kai Wang (3 papers)
  • Peng Cheng (3 papers)
  • Jiming Chen (3 papers)
  • Jianwei Yin (3 papers)
  • Wenbo Shen (3 papers)
  • Runqing Yang (2 papers)
  • Guoming Zhang (2 papers)
  • Xinfeng Li (2 papers)
  • Fan Zhang (2 papers)
  • Boyuan He (2 papers)
  • Yuhao Mao (2 papers)
  • Zhikun Zhang (2 papers)
  • Shibo He (2 papers)
  • Juchuan Zhang (2 papers)
  • Lujia Shen (2 papers)
  • Lei Wu (2 papers)
  • Dinghao Liu (2 papers)
  • Yuwei Li (2 papers)
  • Yuan Chen (2 papers)
  • Qi Pang (2 papers)
  • Rui Shao (1 papers)
  • Zhongjie Ba (1 papers)
  • Xinyu Zhang (1 papers)
  • Qinhan Tan (1 papers)
  • Zhihua Zeng (1 papers)
  • Kai Bu (1 papers)
  • Yijie Shen (1 papers)
  • Jinsong Han (1 papers)
  • Hong Liang (1 papers)
  • Zhenrui Zhang (1 papers)
  • Chaohao Li (1 papers)
  • Xiang Ling (1 papers)
  • Jiaxu Zou (1 papers)
  • Jiannan Wang (1 papers)
  • Yuepeng Zhang (1 papers)
  • Rui Zhang (1 papers)
  • Jian Liu (1 papers)
  • Yuan Ding (1 papers)
  • Zhibo Wang (1 papers)
  • Qingbiao Wu (1 papers)
  • Jialuo Chen (1 papers)
  • Jingyi Wang (1 papers)
  • Tinglan Peng (1 papers)
  • Saizhuo Wang (1 papers)
  • Yan Jiang (1 papers)
  • Tianchen Zhang (1 papers)
  • Taimin Zhang (1 papers)
  • Zhenyuan LI (1 papers)
  • Chunlin Xiong (1 papers)
  • Tiantian Zhu (1 papers)
  • Yan Long (1 papers)
  • Chenghui Shi (1 papers)
  • Qianjun Liu (1 papers)
  • Yao Zhang (1 papers)
  • Linkang Du (1 papers)
  • Shaojie Bai (1 papers)
  • Lirong Fu (1 papers)
  • Peiyu Liu (1 papers)
  • Yuxuan Duan (1 papers)
  • Zihui Zhang (1 papers)
  • Wenzhi Chen (1 papers)
  • Yutian Yang (1 papers)
  • Tianyu Zhou (1 papers)
  • Yijie Bai (1 papers)
  • Kaibo Wang (1 papers)
  • Muhui Jiang (1 papers)
  • Lin Ma (1 papers)
  • Qiang Liu (1 papers)
  • Zhenguang Liu (1 papers)
  • Jianhai Chen (1 papers)
  • Qinming He (1 papers)
  • Gaoning Pan (1 papers)
  • Yongkang Jia (1 papers)
  • Shui Jiang (1 papers)
  • Jishen Li (1 papers)
  • Jiangyi Deng (1 papers)
  • Yuyou Gan (1 papers)
  • Yuwen Pu (1 papers)
  • Meng Han (1 papers)
  • Xuechao Du (1 papers)
  • Yan Chen (1 papers)
  • Yu Song (1 papers)
  • Yueyao Chen (1 papers)
  • Lixu Wang (1 papers)
  • Yiwen Lu (1 papers)
  • Yuxuan Si (1 papers)
  • Xing Li (1 papers)
  • Qinying Wang (1 papers)
  • Yuhong Kan (1 papers)
  • Zhaowei Lin (1 papers)
  • Changting Lin (1 papers)
  • Shuiguang Deng (1 papers)
  • Ruiwen He (1 papers)
  • Jiaqi Li (1 papers)
  • Guorui Xu (1 papers)
  • Chong Fu (1 papers)
  • Jinyin Chen (1 papers)
  • Zhijian Xu (1 papers)
  • Changjiang Li (1 papers)
  • Shouling Ji Xuhong Zhang (1 papers)

Papers

"AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable"

Wenyuan Xu, ... -- NDSS 2014

"A Large-Scale Empirical Analysis on Chinese Web Passwords"

Wenyuan Xu, ... -- Usenix 2014

"Vetting SSL Usage in Applications with SSLINT"

Boyuan He, Runqing Yang, Zhenrui Zhang, ... -- Oakland 2015

"Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces"

Rui Shao, ... -- NDSS 2016

"On Code Execution Tracking via Power Side-Channel"

Wenyuan Xu, ... -- CCS 2016

"DolphinAttack: Inaudible Voice Commands"

Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu, ... -- CCS 2017

"Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems"

Chaohao Li, Wenyuan Xu, ... -- Oakland 2018

"CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy"

Zhikun Zhang, Shibo He, Jiming Chen, ... -- CCS 2018

"Model-Reuse Attacks on Learning Systems"

Shouling Ji, ... -- CCS 2018

"FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps"

Xuechao Du, Boyuan He, Yan Chen, ... -- Usenix 2018

"TextBugger: Generating Adversarial Text Against Real-world Applications"

Jinfeng Li, Shouling Ji, Tianyu Du, ... -- NDSS 2019

"DeepSec: A Uniform Platform for Security Analysis of Deep Learning Models"

Xiang Ling, Shouling Ji, Jiaxu Zou, Jiannan Wang, Chunming Wu, ... -- Oakland 2019

"Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone"

Wenyuan Xu, ... -- Oakland 2019

"Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy"

Zhan Qin, ... -- CCS 2019

"DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU"

Yushi Cheng, Xiaoyu Ji, Juchuan Zhang, Wenyuan Xu, ... -- CCS 2019

"Different is Good: Detecting the Use of Uninitialized Variables through Differential Replay"

Yajin Zhou, ... -- CCS 2019

"Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts"

Zhenyuan LI, Chunlin Xiong, Tiantian Zhu, ... -- CCS 2019

"LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed"

Yajin Zhou, Kui Ren, ... -- CCS 2019

"The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification"

Chen Yan, Yan Long, Xiaoyu Ji, Wenyuan Xu, ... -- CCS 2019

"PeX: A Permission Check Analysis Framework for Linux Kernel"

Wenbo Shen, ... -- Usenix 2019

"MOPT: Optimized Mutation Scheduling for Fuzzers"

Chenyang Lyu, Shouling Ji, Shouling Ji, Yuwei Li, Yu Song, ... -- Usenix 2019

"Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer"

Zhongjie Ba, Xinyu Zhang, Zhan Qin, Kui Ren, ... -- NDSS 2020

"OcuLock: Exploring Human Visual System for Authentication in Virtual Reality Head-mounted Display"

Feng Lin, ... -- NDSS 2020

"PhantomCache: Obfuscating Cache Conflicts with Localized Randomization"

Qinhan Tan, Zhihua Zeng, Kai Bu, Kui Ren, ... -- NDSS 2020

"UISCOPE: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications"

Runqing Yang, ... -- NDSS 2020

"Privacy Risks of General-Purpose Language Models"

Shouling Ji, ... -- Oakland 2020

"SoK: A Minimalist Approach to Formalizing Analog Sensor Security"

Chen Yan, Wenyuan Xu, ... -- Oakland 2020

"A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models"

Shouling Ji, ... -- CCS 2020

"Text Captcha Is Dead? A Large Scale Deployment and Empirical Study"

Chenghui Shi, Shouling Ji, Qianjun Liu, ... -- CCS 2020

"TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation"

Jinfeng Li, Tianyu Du, Shouling Ji, ... -- Usenix 2020

"Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent"

Shouling Ji, ... -- Usenix 2020

"Interpretable Deep Learning under Fire"

Shouling Ji, ... -- Usenix 2020

"POP and PUSH: Demystifying and Defending against (Mach) Port-oriented Programming"

Yajin Zhou, ... -- NDSS 2021

"EarArray: Defending against DolphinAttack via Acoustic Attenuation"

Guoming Zhang, Xiaoyu Ji, Xinfeng Li, Wenyuan Xu, ... -- NDSS 2021

"Happer: Unpacking Android Apps via a Hardware-Assisted Approach"

Yajin Zhou, ... -- Oakland 2021

"Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision"

Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, ... -- Oakland 2021

"Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks"

Tianyu Du, Shouling Ji, Lujia Shen, Yao Zhang, Jinfeng Li, Jianwei Yin, ... -- CCS 2021

"AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy"

Linkang Du, Shaojie Bai, Shouling Ji, Peng Cheng, Jiming Chen, ... -- CCS 2021

"CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels"

Lirong Fu, Shouling Ji, Peiyu Liu, Xuhong Zhang, Yuxuan Duan, Zihui Zhang, Wenzhi Chen, ... -- CCS 2021

"Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization"

Wenbo Shen, Yutian Yang, Tianyu Zhou, Kui Ren, ... -- CCS 2021

"FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants"

Yanjiao Chen, Yijie Bai, Kaibo Wang, Wenyuan Xu, ... -- CCS 2021

"ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels"

Muhui Jiang, Lin Ma, Yajin Zhou, Qiang Liu, Lei Wu, Kui Ren, ... -- CCS 2021

"Backdoor Pre-trained Models Can Transfer to All"

Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jianwei Yin, ... -- CCS 2021

"Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths"

Dinghao Liu, Shouling Ji, Zhenguang Liu, Jianhai Chen, Qinming He, ... -- CCS 2021

"V-SHUTTLE: Scalable and Semantics-Aware Hypervisor Fuzzing"

Gaoning Pan, Xuhong Zhang, Yongkang Jia, Shouling Ji, Chunming Wu, ... -- CCS 2021

"CapSpeaker: Injecting Sounds to Microphones via Capacitors"

Xiaoyu Ji, Juchuan Zhang, Shui Jiang, Jishen Li, Wenyuan Xu, ... -- CCS 2021

"PrivSyn: Differentially Private Data Synthesis"

Zhikun Zhang, Shibo He, Jiming Chen, ... -- Usenix 2021

"EOSAFE: Security Analysis of EOSIO Smart Contracts"

Lei Wu, ... -- Usenix 2021

"Graph Backdoor"

Shouling Ji, ... -- Usenix 2021

"UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers"

Yuwei Li, Shouling Ji, Yuan Chen, Yueyao Chen, Chenyang Lyu, Chunming Wu, Peng Cheng, ... -- Usenix 2021

"mID: Tracing Screen Photos via Moiré Patterns"

Yushi Cheng, Xiaoyu Ji, Lixu Wang, Qi Pang, Wenyuan Xu, ... -- Usenix 2021

"Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages"

Yiwen Lu, Yuxuan Si, Fan Zhang, ... -- Usenix 2021

"Automatic Policy Generation for Inter-Service Access Control of Microservices"

Xing Li, ... -- Usenix 2021

"MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols"

Qinying Wang, Shouling Ji, Xuhong Zhang, Yuhong Kan, Zhaowei Lin, Changting Lin, Shuiguang Deng, ... -- Usenix 2021

"ATTEQ-NN: Attention-based QoE-aware Evasive Backdoor Attacks"

Yanjiao Chen, ... -- NDSS 2022

"FakeGuard: Exploring haptic response to mitigate the vulnerability in commercial fingerprint anti-spoofing"

Yijie Shen, Jinsong Han, Fan Zhang, Feng Lin, Kui Ren, ... -- NDSS 2022

"Uncovering Cross-Context Inconsistent Access Control Enforcement in Android"

Yajin Zhou, ... -- NDSS 2022

"SpiralSpy: Exploring a Stealthy and Practical Covert Channel to Attack Air-gapped Computing Devices via mmWave Sensing"

Feng Lin, Kui Ren, ... -- NDSS 2022

"EMS: History-Driven Mutation for Coverage-based Fuzzing"

Chenyang Lyu, Shouling Ji, Xuhong Zhang, Hong Liang, ... -- NDSS 2022

"Adversarial Examples for Proof-of-Learning"

Rui Zhang, Jian Liu, Yuan Ding, Zhibo Wang, Qingbiao Wu, Kui Ren, Jian Liu, ... -- Oakland 2022

"Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models"

Jialuo Chen, Jingyi Wang, Tinglan Peng, Peng Cheng, Shouling Ji, ... -- Oakland 2022

"Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings"

Yuhao Mao, Saizhuo Wang, Shouling Ji, Xuhong Zhang, ... -- Oakland 2022

"WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens"

Yan Jiang, Xiaoyu Ji, Kai Wang, Chen Yan, Wenyuan Xu, ... -- Oakland 2022

"FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems"

Jiangyi Deng, Yanjiao Chen, Wenyuan Xu, ... -- CCS 2022

"L-SRR: Local Differential Privacy for Location-Based Services with Staircase Randomized Response"

Zhan Qin, ... -- CCS 2022

"Location Heartbleeding: The Rise of Wi-Fi Spoofing Attack Via Geolocation API"

Wenbo Shen, ... -- CCS 2022

"Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs"

Dinghao Liu, Shouling Ji, ... -- CCS 2022

"Is your explanation stable?: A Robustness Evaluation Framework for Feature Attribution"

Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, ... -- CCS 2022

"PrivGuard: Privacy Regulation Compliance Made Easier"

Qi Pang, ... -- Usenix 2022

""OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score"

Ruiwen He, Xiaoyu Ji, Xinfeng Li, Wenyuan Xu, ... -- Usenix 2022

"On the Security Risks of AutoML"

Shouling Ji, ... -- Usenix 2022

"SAID: State-aware Defense Against Injection Attacks on In-vehicle Network"

Yajin Zhou, ... -- Usenix 2022

"SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX"

Yuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Kui Ren, ... -- Usenix 2022

"Label Inference Attacks Against Vertical Federated Learning"

Chong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, ... -- Usenix 2022

"GhostTouch: Targeted Attacks on Touchscreens without Physical Touch"

Kai Wang, Chen Yan, Xiaoyu Ji, Wenyuan Xu, ... -- Usenix 2022

"Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols"

Yajin Zhou, ... -- Usenix 2022

"Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition"

Chen Yan, Zhijian Xu, Xiaoyu Ji, Wenyuan Xu, ... -- Usenix 2022

"Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era"

Changjiang Li, Shouling Ji Xuhong Zhang, ... -- Usenix 2022