Follow
Cong Shi
Title
Cited by
Cited by
Year
Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT
C Shi, J Liu, H Liu, Y Chen
Proceedings of the 18th ACM international symposium on mobile ad hoc …, 2017
2892017
Real-time, universal, and robust adversarial attacks against speaker recognition systems
Y Xie, C Shi, Z Li, J Liu, Y Chen, B Yuan
ICASSP 2020-2020 IEEE international conference on acoustics, speech and …, 2020
972020
Practical adversarial attacks against speaker recognition systems
Z Li, C Shi, Y Xie, J Liu, B Yuan, Y Chen
Proceedings of the 21st international workshop on mobile computing systems …, 2020
822020
Device-free personalized fitness assistant using WiFi
X Guo, J Liu, C Shi, H Liu, Y Chen, MC Chuah
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018
712018
WiFi-enabled smart human dynamics monitoring
X Guo, B Liu, C Shi, H Liu, Y Chen, MC Chuah
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 1-13, 2017
702017
Enabling fast and universal audio adversarial attack using generative model
Y Xie, Z Li, C Shi, J Liu, Y Chen, B Yuan
Proceedings of the AAAI conference on artificial intelligence 35 (16), 14129 …, 2021
582021
Face-Mic: inferring live speech and speaker identity via subtle facial dynamics captured by AR/VR motion sensors
C Shi, X Xu, T Zhang, P Walker, Y Wu, J Liu, N Saxena, Y Chen, J Yu
Proceedings of the 27th Annual International Conference on Mobile Computing …, 2021
402021
Simultaneous monitoring of multiple people’s vital sign leveraging a single phased-MIMO radar
Z Xu, C Shi, T Zhang, S Li, Y Yuan, CTM Wu, Y Chen, A Petropulu
IEEE Journal of Electromagnetics, RF and Microwaves in Medicine and Biology …, 2022
332022
Robust detection of machine-induced audio attacks in intelligent audio systems with microphone array
Z Li, C Shi, T Zhang, Y Xie, J Liu, B Yuan, Y Chen
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
282021
Improvement of the depth resolution in depth-resolved wavenumber-scanning interferometry using multiple uncorrelated wavenumber bands
J Xu, Y Liu, B Dong, Y Bai, L Hu, C Shi, Z Xu, Y Zhou
Applied Optics 52 (20), 4890-4897, 2013
252013
Audio-domain position-independent backdoor attack via unnoticeable triggers
C Shi, T Zhang, Z Li, H Phan, T Zhao, Y Wang, J Liu, B Yuan, Y Chen
Proceedings of the 28th Annual International Conference on Mobile Computing …, 2022
222022
CardioCam: Leveraging Camera on Mobile Devices to Verify Users While Their Heart is Pumping
J Liu, C Shi, Y Chen, H Liu, M Gruteser
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
212019
mPose: Environment-and subject-agnostic 3D skeleton posture reconstruction leveraging a single mmWave device
C Shi, L Lu, J Liu, Y Wang, Y Chen, J Yu
Smart Health 23, 100228, 2022
202022
WiFi-enabled user authentication through deep learning in daily activities
C Shi, J Liu, H Liu, Y Chen
ACM Transactions on Internet of Things 2 (2), 1-25, 2021
192021
WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training
C Shi, Y Wang, Y Chen, N Saxena, C Wang
Annual Computer Security Applications Conference, 829–842, 2020
172020
Real-time, robust and adaptive universal adversarial attacks against speaker recognition systems
Y Xie, Z Li, C Shi, J Liu, Y Chen, B Yuan
Journal of signal processing systems, 1-14, 2021
152021
Towards environment-independent behavior-based user authentication using wifi
C Shi, J Liu, N Borodinov, B Leao, Y Chen
2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems …, 2020
142020
Environment-independent in-baggage object identification using WiFi signals
C Shi, T Zhao, Y Xie, T Zhang, Y Wang, X Guo, Y Chen
2021 IEEE 18th international conference on mobile ad hoc and smart systems …, 2021
82021
Secret key distribution leveraging color shift over visible light channel
H Liu, B Liu, C Shi, Y Chen
2017 IEEE Conference on Communications and Network Security (CNS), 1-9, 2017
82017
RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNN
H Phan, C Shi, Y Xie, T Zhang, Z Li, T Zhao, J Liu, Y Wang, Y Chen, ...
European Conference on Computer Vision, 708-724, 2022
62022
The system can't perform the operation now. Try again later.
Articles 1–20