Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks C Wu, K He, J Chen, Z Zhao, R Du USENIX Security Symposium, 2020 | 40 | 2020 |
ICAuth: Implicit and Continuous Authentication When the Screen Is Awake C Wu, K He, J Chen, R Du ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019 | 9 | 2019 |
Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-touch Behaviors C Wu, K He, J Chen, Z Zhao, R Du IEEE Transactions on Dependable and Secure Computing 19 (6), 4002-4018, 2021 | 8 | 2021 |
CaiAuth: Context-aware Implicit Authentication When the Screen Is Awake C Wu, K He, J Chen, R Du, Y Xiang IEEE Internet of Things Journal 7 (12), 11420-11430, 2020 | 7 | 2020 |
EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices C Wu, J Chen, K He, Z Zhao, R Du, C Zhang ACM SIGSAC conference on computer and communications security, 2022 | 5 | 2022 |
Efficient Privacy-preserving Inference Outsourcing for Convolutional Neural Networks X Yang, J Chen, K He, H Bai, C Wu, R Du IEEE Transactions on Information Forensics and Security, 2023 | 3 | 2023 |
It's All in the Touch: Authenticating Users with HOST Gestures on Multi-Touch Screen Devices C Wu, H Cao, G Xu, C Zhou, J Sun, R Yan, Y Liu, H Jiang IEEE Transactions on Mobile Computing, 2024 | 1 | 2024 |
PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG) R Liang, J Chen, K He, Y Wu, G Deng, R Du, C Wu Proceedings of the 46th IEEE/ACM International Conference on Software …, 2024 | 1 | 2024 |
LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices Y Gu, J Chen, C Wu, K He, Z Zhao, R Du Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2024 | 1 | 2024 |
WiFiLeaks: Exposing Stationary Human Presence Through a Wall with Commodity Mobile Devices Y Gu, J Chen, K He, C Wu, Z Zhao, R Du IEEE Transactions on Mobile Computing, 2023 | 1 | 2023 |
CLAD: Robust Audio Deepfake Detection Against Manipulation Attacks with Contrastive Learning H Wu, J Chen, R Du, C Wu, K He, X Shang, H Ren, G Xu arXiv preprint arXiv:2404.15854, 2024 | | 2024 |
EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing X Sun, J Chen, K He, Z He, R Du, Y Feng, Q Zhao, C Wu arXiv preprint arXiv:2404.15000, 2024 | | 2024 |
MagLive: Near-Field Magnetic Sensing-Based Voice Liveness Detection on Smartphones X Sun, J Chen, C Wu, K He, H Xu, Y Feng, R Du, X Chen arXiv preprint arXiv:2404.01106, 2024 | | 2024 |
On the Effectiveness of Distillation in Mitigating Backdoors in Pre-trained Encoder T Han, S Huang, Z Ding, W Sun, Y Feng, C Fang, J Li, H Qian, C Wu, ... arXiv preprint arXiv:2403.03846, 2024 | | 2024 |
CSIPose: Unveiling Body Pose Using Commodity WiFi Devices Through the Wall Y Gu, J Chen, C Wu, K He, J Jia, Y Feng, C Chen, R Du Authorea Preprints, 2024 | | 2024 |