Zhe Zhou
Zhe Zhou
Email verificata su fudan.edu.cn - Home page
Citata da
Citata da
When good becomes evil: Keystroke inference with smartwatch
X Liu, Z Zhou, W Diao, Z Li, K Zhang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Your voice assistant is mine: How to abuse speakers to steal information and control your phone
W Diao, X Liu, Z Zhou, K Zhang
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound
Z Zhou, W Diao, X Liu, K Zhang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
On code execution tracking via power side-channel
Y Liu, L Wei, Z Zhou, K Zhang, W Xu, Q Xu
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
Face flashing: a secure liveness detection protocol based on light reflections
D Tang, Z Zhou, Y Zhang, K Zhang
arXiv preprint arXiv:1801.01949, 2018
An empirical study on android for saving non-shared data on public storage
X Liu, Z Zhou, W Diao, Z Li, K Zhang
IFIP International Information Security and Privacy Conference, 542-556, 2015
Picking up my tab: Understanding and mitigating synchronized token lifting and spending in mobile payment
X Bai, Z Zhou, XF Wang, Z Li, X Mi, N Zhang, T Li, SM Hu, K Zhang
26th {USENIX} Security Symposium ({USENIX} Security 17), 593-608, 2017
Vulnerable gpu memory management: towards recovering raw data from gpu
Z Zhou, W Diao, X Liu, Z Li, K Zhang, R Liu
Proceedings on Privacy Enhancing Technologies 2017 (2), 57-73, 2017
Privacy-preserving Wi-Fi fingerprinting indoor localization
T Zhang, SSM Chow, Z Zhou, M Li
International Workshop on Security, 215-233, 2016
Invisible mask: Practical attacks on face recognition with infrared
Z Zhou, D Tang, X Wang, W Han, X Liu, K Zhang
arXiv preprint arXiv:1803.04683, 2018
Efficient authenticated multi-pattern matching
Z Zhou, T Zhang, SSM Chow, Y Zhang, K Zhang
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
A survey of practical adversarial example attacks
L Sun, M Tan, Z Zhou
Cybersecurity 1 (1), 9, 2018
Gateless treasure: How to get sensitive information from unprotected external storage on Android phones
X Liu, W Diao, Z Zhou, Z Li, K Zhang
CoRR, vol. abs/1407.5410, 2014
All your vms are disconnected: Attacking hardware virtualized network
Z Zhou, Z Li, K Zhang
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
Mind-reading: Privacy attacks exploiting cross-app KeyEvent injections
W Diao, X Liu, Z Zhou, K Zhang, Z Li
European Symposium on Research in Computer Security, 20-39, 2015
Do Not Return Similarity: Face Recovery with Distance
M Tan, Z Zhou
arXiv preprint arXiv:1901.09769, 2019
Leaky DNN: Stealing Deep-Learning Model Secret with GPU Context-Switching Side-Channel
J Wei, Y Zhang, Z Zhou, Z Li, MA Al Faruque
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
A Smart Framework for Fine-Grained Microphone Acoustic Permission Management
W Han, C Cao, Z Zhou, S Chen, L Huang, XS Wang
IEEE Transactions on Dependable and Secure Computing, 2019
RoLMA: A Practical Adversarial Attack Against Deep Learning-Based LPR Systems
M Zha, G Meng, C Lin, Z Zhou, K Chen
International Conference on Information Security and Cryptology, 101-117, 2019
Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection
Z Zhou, D Tang, W Wang, X Wang, Z Li, K Zhang
Proceedings of the 34th Annual Computer Security Applications Conference, 77-88, 2018
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20