Xiaoyu Ji
Title
Cited by
Cited by
Year
Dolphinatack: Inaudible voice commands
G Zhang, C Yan, X Ji, T Zhang, T Zhang, W Xu
ACM CCS 2017, 2017
2982017
Walking down the STAIRS: Efficient collision resolution for wireless sensor networks
X Ji, Y He, J Wang, W Dong, X Wu, Y Liu
INFOCOM, 2014 Proceedings IEEE, 961 - 969, 2014
312014
On Improving Wireless Channel Utilization: A Collision Tolerance-based Approach
X Ji, Y He, J Wang, K Wu, D Liu, K Yi, Y Liu
Mobile Computing, IEEE Transactions on, 2016
232016
Energy efficient link-delay aware routing in wireless sensor networks
X Lai, X Ji, X Zhou, L Chen
IEEE sensors journal 18 (2), 837-848, 2017
202017
Voice over the dins: Improving wireless channel utilization with collision tolerance
X Ji, Y He, J Wang, K Wu, K Yi, Y Liu
Network Protocols (ICNP), 2013 21st IEEE International Conference on, 1-10, 2013
202013
Privacy-aware High-Quality Map Generation with Participatory Sensing
X Chen, X Wu, XY Li, X JI, Y He, Y Liu
Mobile Computing, IEEE Transactions on, 1, 2015
192015
Fbsleuth: Fake base station forensics via radio frequency fingerprinting
Z Zhuang, X Ji, T Zhang, J Zhang, W Xu, Z Li, Y Liu
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
172018
Analyzing and enhancing the security of ultrasonic sensors for autonomous vehicles
W Xu, C Yan, W Jia, X Ji, J Liu
IEEE Internet of Things Journal 5 (6), 5015-5029, 2018
162018
Dewicam: Detecting hidden wireless cameras via smartphones
Y Cheng, X Ji, T Lu, W Xu
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
152018
Channel-aware rate adaptation for backscatter networks
W Gong, H Liu, J Liu, X Fan, K Liu, Q Ma, X Ji
IEEE/ACM Transactions on Networking 26 (2), 751-764, 2018
152018
Hitchhike: Riding Control on Preambles
X Ji, J Wang, M Liu, Y Yan, P Yang, Y Liu
INFOCOM, 2014 Proceedings IEEE, 2499 - 2507, 2014
142014
Music-touch shoes: vibrotactile interface for hearing impaired dancers
L Yao, Y Shi, H Chi, X Ji, F Ying
TEI '10 Proceedings of the fourth international conference on Tangible …, 2010
142010
The feasibility of injecting inaudible voice commands to voice assistants
C Yan, G Zhang, X Ji, T Zhang, T Zhang, W Xu
IEEE Transactions on Dependable and Secure Computing, 2019
92019
COF: Exploiting Concurrency for Low powerOpportunistic Forwarding
D Liu, M Hou, Z Cao, Y He, X Ji, X Zheng
IEEE International Conference on Network Protocols (ICNP), 2015
92015
ToAuth: Towards Automatic Near Field Authentication for Smartphones
W Gu, Z Yang, L Shangguan, X Ji, Y Zhao
Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 …, 2014
92014
Pido: predictive delay optimization for intertidal wireless sensor networks
X Zhou, X Ji, B Wang, Y Cheng, Z Ma, F Choi, B Helmuth, W Xu
Sensors 18 (5), 1464, 2018
72018
Demicpu: Device fingerprinting with magnetic signals radiated by cpu
Y Cheng, X Ji, J Zhang, W Xu, YC Chen
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
62019
Exploiting concurrency for opportunistic forwarding in duty-cycled IoT networks
D Liu, Z Cao, Y He, X Ji, M Hou, H Jiang
ACM Transactions on Sensor Networks (TOSN) 15 (3), 1-33, 2019
62019
HlcAuth: Key-free and secure communications via home-limited channel
C Li, X Ji, X Zhou, J Zhang, J Tian, Y Zhang, W Xu
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
62018
MagneComm: Magnetometer-based Near-Field Communication
H Pan, YC Chen, G Xue, X Ji
Proceedings of the 23rd Annual International Conference on Mobile Computing …, 2017
62017
The system can't perform the operation now. Try again later.
Articles 1–20