Publications

My articles are also available on my Google Scholar profile.

2024

Unity is Strength? Benchmarking the Robustness of Fusion-based 3D Object Detection against Physical Sensor Attack
Zizhi Jin, Xuancun Lu, Bo Yang, Yushi Cheng, Chen Yan, Xiaoyu Ji, Wenyuan Xu.
In WWW’24: The Web Conference, 2024 (To appear)

EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras
Yan long, Qinhong Jiang, Chen Yan, Tobias Alam, Xiaoyu Ji, Wenyuan Xu, Kevin Fu.
In NDSS’24: The Network and Distributed System Security Symposium, 2024 (PDF)

GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards
Qinhong Jiang, Yanze Ren, Yan Long, Chen Yan, Yumai Sun, Xiaoyu Ji, Kevin Fu, Wenyuan Xu.
In NDSS’24: The Network and Distributed System Security Symposium, 2024 (PDF)

Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu.
In NDSS’24: The Network and Distributed System Security Symposium, 2024 (PDF)

Analyzing and Defending GhostTouch Attack against Capacitive Touchscreens
Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu.
In TDSC: IEEE Transactions on Dependable and Secure Computing (Preprint)

2023

MicPro: Microphone-based Voice Privacy Protection
Shilin Xiao, Xiaoyu Ji, Chen Yan, Zhicong Zheng, Wenyuan Xu.
In CCS’23: ACM Conference on Computer and Communications Security, 2023 (PDF,Website)

The Silent Manipulator: A Practical and Inaudible Backdoor Attack against Speech Recognition Systems
Zhicong Zheng, Xinfeng Li, Chen Yan, Xiaoyu Ji, Wenyuan Xu.
In MM’23: The 31st ACM International Conference on Multimedia, 2023 (PDF)

Marionette: Manipulate Your Touchscreen via A Charging Cable
Yan Jiang, Xiaoyu Ji, Kai Wang, Chen Yan, Richard Mitev, Ahmad-Reza Sadeghi, Wenyuan Xu.
In TDSC: IEEE Transactions on Dependable and Secure Computing (Preprint)

Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound
Xinfeng Li, Junning Ze, Chen Yan, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu.
In IoTJ: IEEE Internet of Things Journal (Early Access)

Towards Pitch-Insensitive Speaker Verification via Soundfield
Xinfeng Li, Zhicong Zheng, Chen Yan, Chaohao Li, Xiaoyu Ji, Wenyuan Xu.
In IoTJ: IEEE Internet of Things Journal (Early Access)

BitDance: Manipulating UART Serial Communication with IEMI
Zhixin Xie, Chen Yan, Xiaoyu Ji, Wenyuan Xu.
In RAID’23: The 26th International Symposium on Research in Attacks, Intrusions and Defenses, 2023 (PDF)

Learning Normality Is Enough: A Software-based Mitigation against the Inaudible Voice Attacks
Xinfeng Li, Xiaoyu Ji, Chen Yan, Chaohao Li, Yichen Li, Zhenning Zhang, Wenyuan Xu.
In SEC’23: USENIX Security Symposium, 2023 (PDF, Slides, Demo)

GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI
Qinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou, and Wenyuan Xu.
In SEC’23: USENIX Security Symposium, 2023 (PDF)

Volttack: Control IoT Devices by Manipulating Power Supply Voltage
Kai Wang, Shilin Xiao, Xiaoyu Ji, Chen Yan, Chaohao Li, Wenyuan Xu.
In Oakland’23: IEEE Symposium on Security and Privacy, 2023 (PDF, Webpage)

Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing
Yan Long, Chen Yan, Shilin Xiao, Shivan Prasad, Wenyuan Xu, Kevin Fu.
In Oakland’23: IEEE Symposium on Security and Privacy, 2023 (PDF, Webpage)

PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle
Zizhi Jin, Xiaoyu Ji, Yushi Cheng, Bo Yang, Chen Yan, and Wenyuan Xu.
In Oakland’23: IEEE Symposium on Security and Privacy, 2023 (PDF, Demo)

DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation
Ruochen Zhou, Xiaoyu Ji, Chen Yan, Chaohao Li, Yichao Chen, and Wenyuan Xu.
In Oakland’23: IEEE Symposium on Security and Privacy, 2023 (PDF)

2022

WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens
Yan Jiang, Xiaoyu Ji, Kai Wang, Chen Yan, Richard Mitev, Ahmad-Reza Sadeghi, and Wenyuan Xu.
In Oakland’22: IEEE Symposium on Security and Privacy, 2022 (PDF, Slides, Talk Video, Teaser Video)

Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition
Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu.
In SEC’22: USENIX Security Symposium, 2022 (PDF, Slides, Demo, Talk Video)

GhostTouch: Targeted Attacks on Touchscreens without Physical Touch
Kai Wang, Chen Yan, Richard Mitev, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu.
In SEC’22: USENIX Security Symposium, 2022 (PDF, Webpage, Talk Video)

A Survey on Voice Assistant Security: Attacks and Countermeasures
Chen Yan, Xiaoyu Ji, Kai Wang, Qinhong Jiang, Zizhi Jin, Wenyuan Xu.
In CSUR: ACM Computing Surveys, 55:4, 1-36, 2022 (PDF)

从带内到带外——智能系统的脆弱性体系演变
Wenyuan Xu, Shize Guo, Xiaoyu Ji, and Chen Yan.
In CCCF: 中国计算机学会通讯, 18:2, 46-52, 2022 (PDF)

2021

Poltergeist: Acoustic Manipulation of Image Stabilization towards Object Mis-Labeling
Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Kevin Fu, Wenyuan Xu.
In Oakland’21: IEEE Symposium on Security and Privacy, 2021 (PDF, Webpage, Talk Video, Teaser Video)

2020

A Nonlinearity-based Secure Face-to-Face Device Authentication for Mobile Devices
Xiaoyu Ji, Xinyan Zhou, Chen Yan, Jiangyi Deng, Wenyuan Xu.
In TMC: IEEE Transactions on Mobile Computing, 21:4, 1155-1171, 2022 (PDF)

SoK: A Minimalist Approach to Formalizing Analog Sensor Security
Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, Kevin Fu.
In Oakland’20: IEEE Symposium on Security and Privacy, 2020 (PDF, Slides, Talk Video, Teaser Video)

2019

The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification
Chen Yan, Yan Long, Xiaoyu Ji, Wenyuan Xu.
In CCS’19: ACM Conference on Computer and Communications Security, 2019 (PDF, Slides, Webpage)

The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants
Chen Yan, Guoming Zhang, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu.
In TDSC: IEEE Transactions on Dependable and Secure Computing, 18:3, 1108-1124, 2021 (PDF)

NAuth: Secure Face-to-Face Device Authentication via Nonlinearity
Xinyan Zhou, Xiaoyu Ji, Chen Yan, Jiangyi Deng, Wenyuan Xu.
In INFOCOM’19: IEEE Conference on Computer Communications, 2019 (PDF)
Best In-Session Presentation Award

On Cuba, Diplomats, Ultrasound, and Intermodulation Distortion
Chen Yan, Kevin Fu, Wenyuan Xu.
In CBM: Computers in Biology and Medicine, 104, 250-266, 2019 (PDF)

2018

Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles
Wenyuan Xu, Chen Yan, Weibin Jia, Xiaoyu Ji, Jiaohao Liu.
In IoTJ: IEEE Internet of Things Journal, 5:6, 5015-5029, 2018 (PDF)

On Cuba, Diplomats, Ultrasound, and Intermodulation Distortion
Chen Yan, Kevin Fu, Wenyuan Xu.
University of Michigan Tech Report CSE-TR-001-18 (PDF)

2017

DolphinAttack: Inaudible Voice Commands
Guoming Zhang, Chen Yan (co-first author), Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, and Wenyuan Xu.
In CCS’17: ACM Conference on Computer and Communications Security, 2017 (PDF, Slides, Webpage)
Best Paper Award

Cybersecurity and Medical Devices: A Practical Guide for Cardiac Electrophysiologists
Benjamin Ransford, Daniel B. Kramer, Denis Foo Kune, Julio Auto de Medeiros, Chen Yan, Wenyuan Xu, Thomas Crawford, and Kevin Fu.
In PCE: Pacing and Clinical Electrophysiology, 40:8, 913-917, 2017 (PDF)

勒索软件:我们如何爬出泥沼
Kevin Fu, Harold Thimbleby, Wenyuan Xu, and Chen Yan.
In CMD: 中国医疗设备, 32:7, 167-168, 2017 (PDF)

2016

Can You Trust Autonomous Vehicles: Contactless Attacks against Sensors of Self-driving Vehicles
Chen Yan, Wenyuan Xu, and Jianhao Liu.
In DEF CON 24, 2016 (Whitepaper, Slides, Talk Video)
Tesla Security Researcher Hall of Fame

汽车智能化的安全思考
Chen Yan, and Wenyuan Xu.
In CCCF: 中国计算机学会通讯, 12:1, 20-27, 2016 (PDF)