default search action
Wenyuan Xu 0001
Person information
- affiliation: Zhejiang University, China
Other persons with the same name
- Wenyuan Xu — disambiguation page
- Wenyuan Xu 0002 — University of Minnesota, Department of Electrical Engineering, MN, USA
- Wenyuan Xu 0003 — Northeast Forestry University, School of Civil Engineering, Harbin, China
- Wenyuan Xu 0004 — China Shipbuilding Industry, Systems Engineering Research Institute, Beijing, China
- Wenyuan Xu 0005 — University of South Carolina, Department of Computer Science and Engineering, Columbia, SC, USA (and 1 more)
- Wenyuan Xu 0006 — Yangzhou University, School of Information Engineering, China
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j61]Xinfeng Li, Zhicong Zheng, Chen Yan, Chaohao Li, Xiaoyu Ji, Wenyuan Xu:
Toward Pitch-Insensitive Speaker Verification via Soundfield. IEEE Internet Things J. 11(1): 1175-1189 (2024) - [j60]Xinfeng Li, Junning Ze, Chen Yan, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
Enrollment-Stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound. IEEE Internet Things J. 11(8): 13108-13124 (2024) - [j59]Ruiwen He, Yushi Cheng, Zhicong Zheng, Xiaoyu Ji, Wenyuan Xu:
Fast and Lightweight Voice Replay Attack Detection via Time-Frequency Spectrum Difference. IEEE Internet Things J. 11(18): 29798-29810 (2024) - [j58]Qianhao Miao, Tianyu Ren, Jiahan Dong, Yanjiao Chen, Wenyuan Xu:
A 3C Authentication: A Cross-Domain, Certificateless, and Consortium-Blockchain-Based Authentication Method for Vehicle-to-Grid Networks in a Smart Grid. Symmetry 16(3): 336 (2024) - [j57]Yinan Zhong, Mingyu Pan, Yanjiao Chen, Wenyuan Xu:
Res-DFNN: An NN-Based Device Fingerprint Extraction Method Using Network Packet Data. Symmetry 16(4): 443 (2024) - [j56]Wenyuan Xu, Yushi Cheng, Xiaoyu Ji, Yi-Chao Chen:
On Tracing Screen Photos - A Moiré Pattern-Based Approach. IEEE Trans. Dependable Secur. Comput. 21(4): 2068-2084 (2024) - [j55]Yan Jiang, Xiaoyu Ji, Juchuan Zhang, Yancheng Jiang, Shui Jiang, Wenyuan Xu:
CapSpeaker: Injecting Commands to Voice Assistants Via Capacitors. IEEE Trans. Dependable Secur. Comput. 21(4): 3295-3308 (2024) - [j54]Yan Jiang, Xiaoyu Ji, Kai Wang, Chen Yan, Richard Mitev, Ahmad-Reza Sadeghi, Wenyuan Xu:
Marionette: Manipulate Your Touchscreen via a Charging Cable. IEEE Trans. Dependable Secur. Comput. 21(4): 3309-3323 (2024) - [j53]Yushi Cheng, Xiaoyu Ji, Wenjun Zhu, Shibo Zhang, Kevin Fu, Wenyuan Xu:
Adversarial Computer Vision via Acoustic Manipulation of Camera Sensors. IEEE Trans. Dependable Secur. Comput. 21(4): 3734-3750 (2024) - [j52]Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu:
Analyzing and Defending GhostTouch Attack Against Capacitive Touchscreens. IEEE Trans. Dependable Secur. Comput. 21(5): 4360-4375 (2024) - [j51]Jiangyi Deng, Xiaoyu Ji, Beibei Wang, Bin Wang, Wenyuan Xu:
Dr. Defender: Proactive Detection of Autopilot Drones Based on CSI. IEEE Trans. Inf. Forensics Secur. 19: 194-206 (2024) - [j50]Xiaoyu Ji, Qinhong Jiang, Chaohao Li, Zhuoyang Shi, Wenyuan Xu:
Watch Your Speed: Injecting Malicious Voice Commands via Time-Scale Modification. IEEE Trans. Inf. Forensics Secur. 19: 3366-3379 (2024) - [j49]Xiaoyu Ji, Juchuan Zhang, Shan Zou, Yi-Chao Chen, Gang Qu, Wenyuan Xu:
MagView++: Data Exfiltration via CPU Magnetic Signals Under Video Decoding. IEEE Trans. Mob. Comput. 23(3): 2486-2503 (2024) - [j48]Guoming Zhang, Xiaoyu Ji, Xinyan Zhou, Donglian Qi, Wenyuan Xu:
Ultrasound Communication Using the Nonlinearity Effect of Microphone Circuits in Smart Devices. ACM Trans. Sens. Networks 20(3): 53:1-53:22 (2024) - [j47]Yushi Cheng, Boyang Zhou, Yanjiao Chen, Yi-Chao Chen, Xiaoyu Ji, Wenyuan Xu:
Evaluating Compressive Sensing on the Security of Computer Vision Systems. ACM Trans. Sens. Networks 20(3): 56:1-56:24 (2024) - [c99]Youqian Zhang, Chunxi Yang, Eugene Yujun Fu, Qinhong Jiang, Chen Yan, Sze-Yiu Chau, Grace Ngai, Hong Va Leong, Xiapu Luo, Wenyuan Xu:
Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection. ICME 2024: 1-6 - [c98]Qinhong Jiang, Yanze Ren, Yan Long, Chen Yan, Yumai Sun, Xiaoyu Ji, Kevin Fu, Wenyuan Xu:
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards. NDSS 2024 - [c97]Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu:
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time. NDSS 2024 - [c96]Yan Long, Qinhong Jiang, Chen Yan, Tobias Alam, Xiaoyu Ji, Wenyuan Xu, Kevin Fu:
EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded Cameras. NDSS 2024 - [c95]Zhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji, Wenyuan Xu:
UniID: Spoofing Face Authentication System by Universal Identity. NDSS 2024 - [c94]Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
CamPro: Camera-based Anti-Facial Recognition. NDSS 2024 - [c93]Ruiwen He, Yushi Cheng, Junning Ze, Xiaoyu Ji, Wenyuan Xu:
Understanding and Benchmarking the Commonality of Adversarial Examples. SP 2024: 1665-1683 - [c92]Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Liangming Xia, Yijie Bai, Haiqin Weng, Wenyuan Xu:
Sophon: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models. SP 2024: 2553-2571 - [c91]Zizhi Jin, Xuancun Lu, Bo Yang, Yushi Cheng, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
Unity is Strength? Benchmarking the Robustness of Fusion-based 3D Object Detection against Physical Sensor Attack. WWW 2024: 3031-3042 - [e1]Davide Balzarotti, Wenyuan Xu:
33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024. USENIX Association 2024 [contents] - [i21]Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu:
TPatch: A Triggered Physical Adversarial Patch. CoRR abs/2401.00148 (2024) - [i20]Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
CamPro: Camera-based Anti-Facial Recognition. CoRR abs/2401.00151 (2024) - [i19]Xinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan, Yanjiao Chen, Xiaoyu Ji, Wenyuan Xu:
SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models. CoRR abs/2404.06666 (2024) - [i18]Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Liangming Xia, Yijie Bai, Haiqin Weng, Wenyuan Xu:
SOPHON: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models. CoRR abs/2404.12699 (2024) - [i17]Youqian Zhang, Chunxi Yang, Eugene Yujun Fu, Qinhong Jiang, Chen Yan, Sze-Yiu Chau, Grace Ngai, Hong Va Leong, Xiapu Luo, Wenyuan Xu:
Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection. CoRR abs/2407.16327 (2024) - [i16]Jialin Wu, Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Jiayang Xu, Xinfeng Li, Wenyuan Xu:
Legilimens: Practical and Unified Content Moderation for Large Language Model Services. CoRR abs/2408.15488 (2024) - [i15]Jiangyi Deng, Xinfeng Li, Yanjiao Chen, Yijie Bai, Haiqin Weng, Yan Liu, Tao Wei, Wenyuan Xu:
RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer. CoRR abs/2409.02074 (2024) - [i14]Zizhi Jin, Qinhong Jiang, Xuancun Lu, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR. CoRR abs/2409.17907 (2024) - 2023
- [j46]Chen Yan, Xiaoyu Ji, Kai Wang, Qinhong Jiang, Zizhi Jin, Wenyuan Xu:
A Survey on Voice Assistant Security: Attacks and Countermeasures. ACM Comput. Surv. 55(4): 84:1-84:36 (2023) - [j45]Xiaoyu Ji, Yushi Cheng, Wenyuan Xu, Yuehan Chi, Hao Pan, Zhuangdi Zhu, Chuang-Wen You, Yi-Chao Chen, Lili Qiu:
No Seeing is Also Believing: Electromagnetic-Emission-Based Application Guessing Attacks via Smartphones. IEEE Trans. Mob. Comput. 22(2): 1095-1109 (2023) - [j44]Weiwei Fang, Wenyuan Xu, Chongchong Yu, Neal N. Xiong:
Joint Architecture Design and Workload Partitioning for DNN Inference on Industrial IoT Clusters. ACM Trans. Internet Techn. 23(1): 7:1-7:21 (2023) - [j43]Yanjiao Chen, Yushi Cheng, Xiaoyu Ji, Boyang Zhou, Wenyuan Xu, Fei Teng:
PDGes: An Interpretable Detection Model for Parkinson's Disease Using Smartphones. ACM Trans. Sens. Networks 19(4): 77:1-77:21 (2023) - [j42]Zefang Lv, Liang Xiao, Yousong Du, Guohang Niu, Chengwen Xing, Wenyuan Xu:
Multi-Agent Reinforcement Learning Based UAV Swarm Communications Against Jamming. IEEE Trans. Wirel. Commun. 22(12): 9063-9075 (2023) - [c90]Wenyuan Xu:
Rethinking IoT Security: Understanding and Mitigating Out-of-Band Vulnerabilities. AsiaCCS 2023: 1 - [c89]Lingshuo Meng, Yijie Bai, Yanjiao Chen, Yutong Hu, Wenyuan Xu, Haiqin Weng:
Devil in Disguise: Breaching Graph Neural Networks Privacy through Infiltration. CCS 2023: 1153-1167 - [c88]Shilin Xiao, Xiaoyu Ji, Chen Yan, Zhicong Zheng, Wenyuan Xu:
MicPro: Microphone-based Voice Privacy Protection. CCS 2023: 1302-1316 - [c87]Zefang Lv, Guohang Niu, Liang Xiao, Chengwen Xing, Wenyuan Xu:
Reinforcement Learning Based UAV Swarm Communications Against Jamming. ICC 2023: 5204-5209 - [c86]Chen Zhang, Boyang Zhou, Zhiqiang He, Zeyuan Liu, Yanjiao Chen, Wenyuan Xu, Baochun Li:
Oblivion: Poisoning Federated Learning by Inducing Catastrophic Forgetting. INFOCOM 2023: 1-10 - [c85]Zhicong Zheng, Xinfeng Li, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
The Silent Manipulator: A Practical and Inaudible Backdoor Attack against Speech Recognition Systems. ACM Multimedia 2023: 7849-7858 - [c84]Zhixin Xie, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
BitDance: Manipulating UART Serial Communication with IEMI. RAID 2023: 63-76 - [c83]Zhihao Wu, Yushi Cheng, Jiahui Yang, Xiaoyu Ji, Wenyuan Xu:
DepthFake: Spoofing 3D Face Authentication with a 2D Photo. SP 2023: 917-91373 - [c82]Kai Wang, Shilin Xiao, Xiaoyu Ji, Chen Yan, Chaohao Li, Wenyuan Xu:
Volttack: Control IoT Devices by Manipulating Power Supply Voltage. SP 2023: 1771-1788 - [c81]Zizhi Jin, Xiaoyu Ji, Yushi Cheng, Bo Yang, Chen Yan, Wenyuan Xu:
PLA-LiDAR: Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle. SP 2023: 1822-1839 - [c80]Ruochen Zhou, Xiaoyu Ji, Chen Yan, Yi-Chao Chen, Wenyuan Xu, Chaohao Li:
DeHiREC: Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation. SP 2023: 3113-3128 - [c79]Yan Long, Chen Yan, Shilin Xiao, Shivan Prasad, Wenyuan Xu, Kevin Fu:
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing. SP 2023: 3432-3449 - [c78]Wenjun Zhu, Xiaoyu Ji, Yushi Cheng, Shibo Zhang, Wenyuan Xu:
TPatch: A Triggered Physical Adversarial Patch. USENIX Security Symposium 2023: 661-678 - [c77]Shibo Zhang, Yushi Cheng, Wenjun Zhu, Xiaoyu Ji, Wenyuan Xu:
CAPatch: Physical Adversarial Patch against Image Captioning Systems. USENIX Security Symposium 2023: 679-696 - [c76]Xinfeng Li, Xiaoyu Ji, Chen Yan, Chaohao Li, Yichen Li, Zhenning Zhang, Wenyuan Xu:
Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks. USENIX Security Symposium 2023: 2455-2472 - [c75]Yijie Bai, Yanjiao Chen, Hanlei Zhang, Wenyuan Xu, Haiqin Weng, Dou Goodman:
VILLAIN: Backdoor Attacks Against Vertical Split Learning. USENIX Security Symposium 2023: 2743-2760 - [c74]Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu:
Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion. USENIX Security Symposium 2023: 5163-5180 - [c73]Jiangyi Deng, Fei Teng, Yanjiao Chen, Xiaofu Chen, Zhaohui Wang, Wenyuan Xu:
V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization. USENIX Security Symposium 2023: 5181-5198 - [c72]Qinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou, Wenyuan Xu:
GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI. USENIX Security Symposium 2023: 7249-7266 - [i13]Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu:
Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion. CoRR abs/2302.12434 (2023) - [i12]Xinfeng Li, Junning Ze, Chen Yan, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound. CoRR abs/2306.16022 (2023) - [i11]Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu:
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time. CoRR abs/2308.01040 (2023) - [i10]Bo Yang, Xiaoyu Ji, Zizhi Jin, Yushi Cheng, Wenyuan Xu:
Exploring Adversarial Robustness of LiDAR-Camera Fusion Model in Autonomous Driving. CoRR abs/2312.01468 (2023) - 2022
- [j41]Taimin Zhang, Xiaoyu Ji, Wenyuan Xu:
Jamming-Resilient Backup Nodes Selection for RPL-based Routing in Smart Grid AMI Networks. Mob. Networks Appl. 27(1): 329-342 (2022) - [j40]Jiayu Zhang, Min Li, Min-Jian Zhao, Xiaoyu Ji, Wenyuan Xu:
Multi-User Beam Training and Transmission Design for Covert Millimeter-Wave Communication. IEEE Trans. Inf. Forensics Secur. 17: 1528-1543 (2022) - [j39]Xiaoyu Ji, Xinyan Zhou, Chen Yan, Jiangyi Deng, Wenyuan Xu:
A Nonlinearity-Based Secure Face-to-Face Device Authentication for Mobile Devices. IEEE Trans. Mob. Comput. 21(4): 1155-1171 (2022) - [j38]Xiaoyu Ji, Yushi Cheng, Juchuan Zhang, Yuehan Chi, Wenyuan Xu, Yi-Chao Chen:
Device Fingerprinting with Magnetic Induction Signals Radiated by CPU Modules. ACM Trans. Sens. Networks 18(2): 23:1-23:28 (2022) - [c71]Jiangyi Deng, Yanjiao Chen, Wenyuan Xu:
FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems. CCS 2022: 755-767 - [c70]Jiachang Wen, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
Power IoT System Security Monitoring Based On Power Consumption Side Channel Information. EEET 2022: 59-65 - [c69]Jiahui Yang, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
A Small Sticker is Enough: Spoofing Face Recognition Systems via Small Stickers. EITCE 2022: 1075-1082 - [c68]Junning Ze, Xinfeng Li, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
UltraBD: Backdoor Attack against Automatic Speaker Verification Systems via Adversarial Ultrasound. ICPADS 2022: 193-200 - [c67]Shan Zou, Juchuan Zhang, Shui Jiang, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
OutletGuarder: Detecting DarkSide Ransomware by Power Factor Correction Signals in an Electrical Outlet. ICPADS 2022: 419-426 - [c66]Yan Jiang, Xiaoyu Ji, Kai Wang, Chen Yan, Richard Mitev, Ahmad-Reza Sadeghi, Wenyuan Xu:
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens. SP 2022: 984-1001 - [c65]Ruiwen He, Xiaoyu Ji, Xinfeng Li, Yushi Cheng, Wenyuan Xu:
"OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score. USENIX Security Symposium 2022: 1131-1148 - [c64]Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu:
GhostTouch: Targeted Attacks on Touchscreens without Physical Touch. USENIX Security Symposium 2022: 1543-1559 - [c63]Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu:
Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition. USENIX Security Symposium 2022: 1957-1974 - [i9]Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu:
Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition. CoRR abs/2204.02675 (2022) - [i8]Yan Long, Chen Yan, Shivan Prasad, Wenyuan Xu, Kevin Fu:
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing. CoRR abs/2205.03971 (2022) - [i7]Jiangyi Deng, Fei Teng, Yanjiao Chen, Xiaofu Chen, Zhaohui Wang, Wenyuan Xu:
V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization. CoRR abs/2210.15140 (2022) - 2021
- [j37]Wenyuan Xu, Weiwei Fang, Yi Ding, Meixia Zou, Naixue Xiong:
Accelerating Federated Learning for IoT in Big Data Analytics With Pruning, Quantization and Selective Updating. IEEE Access 9: 38457-38466 (2021) - [j36]Mengran Liu, Weiwei Fang, Xiaodong Ma, Wenyuan Xu, Naixue Xiong, Yi Ding:
Channel pruning guided by spatial and channel attention for DNNs in intelligent edge computing. Appl. Soft Comput. 110: 107636 (2021) - [j35]Jiayu Zhang, Zhiyun Wang, Xiaoyu Ji, Wenyuan Xu, Gang Qu, Minjian Zhao:
Who is Charging My Phone? Identifying Wireless Chargers via Fingerprinting. IEEE Internet Things J. 8(4): 2992-2999 (2021) - [j34]Chen Yan, Guoming Zhang, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu:
The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants. IEEE Trans. Dependable Secur. Comput. 18(3): 1108-1124 (2021) - [j33]Chaohao Li, Xiaoyu Ji, Bin Wang, Kai Wang, Wenyuan Xu:
SenCS: Enabling Real-time Indoor Proximity Verification via Contextual Similarity. ACM Trans. Sens. Networks 17(2): 19:1-19:22 (2021) - [j32]Yilin Xiao, Liang Xiao, Zefang Lv, Guohang Niu, Yuzhen Ding, Wenyuan Xu:
Learning-Based Low-Latency VIoT Video Streaming Against Jamming and Interference. IEEE Wirel. Commun. 28(4): 12-18 (2021) - [c62]Yanjiao Chen, Yijie Bai, Richard Mitev, Kaibo Wang, Ahmad-Reza Sadeghi, Wenyuan Xu:
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants. CCS 2021: 1861-1883 - [c61]Xiaoyu Ji, Juchuan Zhang, Shui Jiang, Jishen Li, Wenyuan Xu:
CapSpeaker: Injecting Voices to Microphones via Capacitors. CCS 2021: 1915-1929 - [c60]Weizhao Jin, Xiaoyu Ji, Ruiwen He, Zhou Zhuang, Wenyuan Xu, Yuan Tian:
SMS Goes Nuclear: Fortifying SMS-Based MFA in Online Account Ecosystem. DSN Workshops 2021: 7-14 - [c59]Zhuoyang Shi, Chaohao Li, Zizhi Jin, Weinong Sun, Xiaoyu Ji, Wenyuan Xu:
Anti-Replay: A Fast and Lightweight Voice Replay Attack Detection System. ICPADS 2021: 169-176 - [c58]Guoming Zhang, Xiaoyu Ji, Xinfeng Li, Gang Qu, Wenyuan Xu:
EarArray: Defending against DolphinAttack via Acoustic Attenuation. NDSS 2021 - [c57]Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, Kevin Fu:
Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision. SP 2021: 160-175 - [c56]Yushi Cheng, Xiaoyu Ji, Lixu Wang, Qi Pang, Yi-Chao Chen, Wenyuan Xu:
mID: Tracing Screen Photos via Moiré Patterns. USENIX Security Symposium 2021: 2969-2986 - [c55]Juchuan Zhang, Xiaoyu Ji, Yuehan Chi, Yi-Chao Chen, Bin Wang, Wenyuan Xu:
OutletSpy: cross-outlet application inference via power factor correction signal. WISEC 2021: 181-191 - [i6]Weizhao Jin, Xiaoyu Ji, Ruiwen He, Zhou Zhuang, Wenyuan Xu, Yuan Tian:
Towards Fortifying the Multi-Factor-Based Online Account Ecosystem. CoRR abs/2104.08651 (2021) - [i5]Yanjiao Chen, Yijie Bai, Richard Mitev, Kaibo Wang, Ahmad-Reza Sadeghi, Wenyuan Xu:
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants. CoRR abs/2109.09958 (2021) - 2020
- [j31]Guoming Zhang, Xiaoyu Ji, Yanjie Li, Wenyuan Xu:
Power-Based Non-Intrusive Condition Monitoring for Terminal Device in Smart Grid. Sensors 20(13): 3635 (2020) - [j30]Wenyuan Xu, Jing Tian, Yu Cao, Song Wang:
Challenge-Response Authentication Using In-Air Handwriting Style Verification. IEEE Trans. Dependable Secur. Comput. 17(1): 51-64 (2020) - [j29]Weili Han, Chang Cao, Hao Chen, Dong Li, Zheran Fang, Wenyuan Xu, X. Sean Wang:
senDroid: Auditing Sensor Access in Android System-Wide. IEEE Trans. Dependable Secur. Comput. 17(2): 407-421 (2020) - [j28]Xiaoyu Ji, Chaohao Li, Xinyan Zhou, Juchuan Zhang, Yanmiao Zhang, Wenyuan Xu:
Authenticating Smart Home Devices via Home Limited Channels. ACM Trans. Internet Things 1(4): 24:1-24:24 (2020) - [j27]Yushi Cheng, Xiaoyu Ji, Tianyang Lu, Wenyuan Xu:
On Detecting Hidden Wireless Cameras: A Traffic Pattern-based Approach. IEEE Trans. Mob. Comput. 19(4): 907-921 (2020) - [j26]Hui Chen, Guiguang Ding, Zijia Lin, Sicheng Zhao, Xiaopeng Gu, Wenyuan Xu, Jungong Han:
ACMNet: Adaptive Confidence Matching Network for Human Behavior Analysis via Cross-modal Retrieval. ACM Trans. Multim. Comput. Commun. Appl. 16(1s): 27:1-27:21 (2020) - [j25]Xiaoyu Ji, Xinyan Zhou, Miao Xu, Wenyuan Xu, Yabo Dong:
OPCIO: Optimizing Power Consumption for Embedded Devices via GPIO Configuration. ACM Trans. Sens. Networks 16(2): 16:1-16:28 (2020) - [j24]Yushi Cheng, Xiaoyu Ji, Xiaopeng Li, Tianchen Zhang, Sharaf J. Malebary, Xianshan Qu, Wenyuan Xu:
Identifying Child Users via Touchscreen Interactions. ACM Trans. Sens. Networks 16(4): 35:1-35:25 (2020) - [c54]Karoline Busse, Mohammad Tahaei, Katharina Krombholz, Emanuel von Zezschwitz, Matthew Smith, Jing Tian, Wenyuan Xu:
Cash, Cards or Cryptocurrencies? A Study of Payment Culture in Four Countries. EuroS&P Workshops 2020: 200-209 - [c53]Feng Xue, Weiwei Fang, Wenyuan Xu, Qi Wang, Xiaodong Ma, Yi Ding:
EdgeLD: Locally Distributed Deep Learning Inference on Edge Device Clusters. HPCC/DSS/SmartCity 2020: 613-619 - [c52]Juchuan Zhang, Xiaoyu Ji, Wenyuan Xu, Yi-Chao Chen, Yuting Tang, Gang Qu:
MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding. INFOCOM 2020: 357-366 - [c51]Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, Kevin Fu:
SoK: A Minimalist Approach to Formalizing Analog Sensor Security. SP 2020: 233-248 - [i4]Mengran Liu, Weiwei Fang, Xiaodong Ma, Wenyuan Xu, Naixue Xiong, Yi Ding:
Channel Pruning Guided by Spatial and Channel Attention for DNNs in Intelligent Edge Computing. CoRR abs/2011.03891 (2020)
2010 – 2019
- 2019
- [j23]Chen Yan, Kevin Fu, Wenyuan Xu:
On Cuba, diplomats, ultrasound, and intermodulation distortion. Comput. Biol. Medicine 104: 250-266 (2019) - [j22]Taimin Zhang, Xiaoyu Ji, Zhou Zhuang, Wenyuan Xu:
JamCatcher: A Mobile Jammer Localization Scheme for Advanced Metering Infrastructure in Smart Grid. Sensors 19(4): 909 (2019) - [c50]Yushi Cheng, Xiaoyu Ji, Wenyuan Xu, Hao Pan, Zhuangdi Zhu, Chuang-Wen You, Yi-Chao Chen, Lili Qiu:
MagAttack: Guessing Application Launching and Operation via Smartphone. AsiaCCS 2019: 283-294 - [c49]Yushi Cheng, Xiaoyu Ji, Juchuan Zhang, Wenyuan Xu, Yi-Chao Chen:
DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU. CCS 2019: 1149-1170 - [c48]Chen Yan, Yan Long, Xiaoyu Ji, Wenyuan Xu:
The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification. CCS 2019: 1215-1229 - [c47]Dongliang Xiong, Kai Huang, Siang Chen, Bowen Li, Haitian Jiang, Wenyuan Xu:
NoUCSR: Efficient Super-Resolution Network without Upsampling Convolution. ICCV Workshops 2019: 3378-3387 - [c46]Xinyan Zhou, Xiaoyu Ji, Chen Yan, Jiangyi Deng, Wenyuan Xu:
NAuth: Secure Face-to-Face Device Authentication via Nonlinearity. INFOCOM 2019: 2080-2088 - [c45]Guoming Zhang, Xiaoyu Ji, Xinyan Zhou, Donglian Qi, Wenyuan Xu:
UltraComm: High-Speed and Inaudible Acoustic Communication. QSHINE 2019: 184-204 - [c44]Taimin Zhang, Xiaoyu Ji, Wenyuan Xu:
AHV-RPL: Jamming-Resilient Backup Nodes Selection for RPL-Based Routing in Smart Grid AMI Networks. QSHINE 2019: 235-251 - [c43]Andrew Kwong, Wenyuan Xu, Kevin Fu:
Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone. IEEE Symposium on Security and Privacy 2019: 905-919 - 2018
- [j21]Kevin Fu, Wenyuan Xu:
Risks of trusting the physics of sensors. Commun. ACM 61(2): 20-23 (2018) - [j20]Wenyuan Xu, Chen Yan, Weibin Jia, Xiaoyu Ji, Jianhao Liu:
Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles. IEEE Internet Things J. 5(6): 5015-5029 (2018) - [j19]Xiaoyu Ji, Yushi Cheng, Wenyuan Xu, Xinyan Zhou:
User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes. Secur. Commun. Networks 2018: 3980371:1-3980371:10 (2018) - [j18]Xinyan Zhou, Xiaoyu Ji, Yi-Chao Chen, Xiaopeng Li, Wenyuan Xu:
LESS: Link Estimation with Sparse Sampling in Intertidal WSNs. Sensors 18(3): 747 (2018) - [j17]Xinyan Zhou, Xiaoyu Ji, Bin Wang, Yushi Cheng, Zhuoran Ma, Francis Choi, Brian Helmuth, Wenyuan Xu:
Pido: Predictive Delay Optimization for Intertidal Wireless Sensor Networks. Sensors 18(5): 1464 (2018) - [j16]Weili Han, Zhigong Li, Minyue Ni, Guofei Gu, Wenyuan Xu:
Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis. IEEE Trans. Dependable Secur. Comput. 15(2): 309-320 (2018) - [j15]Hossen Asiful Mustafa, Wenyuan Xu, Ahmad-Reza Sadeghi, Steffen Schulz:
End-to-End Detection of Caller ID Spoofing Attacks. IEEE Trans. Dependable Secur. Comput. 15(3): 423-436 (2018) - [c42]Yushi Cheng, Xiaoyu Ji, Tianyang Lu, Wenyuan Xu:
DeWiCam: Detecting Hidden Wireless Cameras via Smartphones. AsiaCCS 2018: 1-13 - [c41]Chaohao Li, Xiaoyu Ji, Xinyan Zhou, Juchuan Zhang, Jing Tian, Yanmiao Zhang, Wenyuan Xu:
HlcAuth: Key-free and Secure Communications via Home-Limited Channel. AsiaCCS 2018: 29-35 - [c40]Zhou Zhuang, Xiaoyu Ji, Taimin Zhang, Juchuan Zhang, Wenyuan Xu, Zhenhua Li, Yunhao Liu:
FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting. AsiaCCS 2018: 261-272 - [c39]Connor Bolton, Sara Rampazzi, Chaohao Li, Andrew Kwong, Wenyuan Xu, Kevin Fu:
Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems. IEEE Symposium on Security and Privacy 2018: 1048-1062 - [c38]Xiaopeng Li, Sharaf J. Malebary, Xianshan Qu, Xiaoyu Ji, Yushi Cheng, Wenyuan Xu:
iCare: Automatic and User-friendly Child Identification on Smartphones. HotMobile 2018: 43-48 - [i3]Xiaopeng Li, Xianshan Qu, Wenyuan Xu, Song Wang, Yan Tong, Lannan Luo:
Validating the Contextual Information of Outdoor Images for Photo Misuse Detection. CoRR abs/1811.08951 (2018) - [i2]Wenyuan Xu, Xiaopeng Li, Jing Tian, Yujun Xiao, Xianshan Qu, Song Wang, Xiaoyu Ji:
Which One to Go: Security and Usability Evaluation of Mid-Air Gestures. CoRR abs/1811.10168 (2018) - 2017
- [j14]Zeqing Guo, Weili Han, Liangxing Liu, Wenyuan Xu, Minyue Ni, Yunlei Zhao, Xiaoyang Sean Wang:
Socialized policy administration. Comput. Secur. 67: 232-243 (2017) - [j13]Yujun Xiao, Wenyuan Xu, Zhenhua Jia, Zhuoran Ma, Donglian Qi:
NIPAD: a non-invasive power-based anomaly detection scheme for programmable logic controllers. Frontiers Inf. Technol. Electron. Eng. 18(4): 519-534 (2017) - [c37]Xiaopeng Li, Wenyuan Xu, Song Wang, Xianshan Qu:
Are You Lying: Validating the Time-Location of Outdoor Images. ACNS 2017: 103-123 - [c36]Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu:
DolphinAttack: Inaudible Voice Commands. CCS 2017: 103-117 - [c35]Yuwei Zheng, Lin Huang, Haoqi Shan, Jun Li, Qing Yang, Wenyuan Xu:
Ghost telephonist impersonates you: Vulnerability in 4G LTE CS fallback. CNS 2017: 1-9 - [c34]Timothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, Kevin Fu:
WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks. EuroS&P 2017: 3-18 - [c33]Yushi Cheng, Xiaoyu Ji, Xinyan Zhou, Wenyuan Xu:
HomeSpy: Inferring User Presence via Encrypted Traffic of Home Surveillance Camera. ICPADS 2017: 779-782 - [c32]Xiaohan Lai, Miao Xu, Xiaoyu Ji, Wenyuan Xu, Longdao Chen:
En-MAC: Environment-aware MAC protocol for WSNs in intertidal environment. WCSP 2017: 1-6 - [c31]Zhuoran Ma, Xinyan Zhou, Xuan Ouyang, Xiaoyu Ji, Wenyuan Xu:
A robust backup routing protocol for neighbor area network in the smart grid. WCSP 2017: 1-6 - [c30]Xinyan Zhou, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
SADO: State-associated and delay-oriented data collection for intertidal WSNs. WCSP 2017: 1-6 - [i1]Guoming Zhang, Chen Yan, Xiaoyu Ji, Taimin Zhang, Tianchen Zhang, Wenyuan Xu:
DolphinAtack: Inaudible Voice Commands. CoRR abs/1708.09537 (2017) - 2016
- [j12]Yi-nan Wang, Zhiyun Lin, Xiao Liang, Wenyuan Xu, Qiang Yang, Gangfeng Yan:
On modeling of electrical cyber-physical systems considering cyber security. Frontiers Inf. Technol. Electron. Eng. 17(5): 465-478 (2016) - [j11]Weili Han, Zhigong Li, Lang Yuan, Wenyuan Xu:
Regional Patterns and Vulnerability Analysis of Chinese Web Passwords. IEEE Trans. Inf. Forensics Secur. 11(2): 258-272 (2016) - [j10]Miao Xu, Wenyuan Xu, Tingrui Han, Zhiyun Lin:
Energy-Efficient Time Synchronization in Wireless Sensor Networks via Temperature-Aware Compensation. ACM Trans. Sens. Networks 12(2): 12:1-12:29 (2016) - [c29]Yannan Liu, Lingxiao Wei, Zhe Zhou, Kehuan Zhang, Wenyuan Xu, Qiang Xu:
On Code Execution Tracking via Power Side-Channel. CCS 2016: 1019-1031 - [c28]Xiaohui Wang, Yanjing Wu, Wenyuan Xu:
WindCompass: Determine Wind Direction Using Smartphones. SECON 2016: 1-9 - 2015
- [c27]Zeqing Guo, Weili Han, Liangxing Liu, Wenyuan Xu, Ruiqi Bu, Minyue Ni:
SPA: Inviting Your Friends to Help Set Android Apps. SACMAT 2015: 221-231 - 2014
- [j9]Zhenhua Liu, Hongbo Liu, Wenyuan Xu, Yingying Chen:
An Error-Minimizing Framework for Localizing Jammers in Wireless Networks. IEEE Trans. Parallel Distributed Syst. 25(2): 508-517 (2014) - [c26]Gorkem Kar, Hossen Asiful Mustafa, Yan Wang, Yingying Chen, Wenyuan Xu, Marco Gruteser, Tam Vu:
Detection of On-Road Vehicles Emanating GPS Interference. CCS 2014: 621-632 - [c25]Hossen Asiful Mustafa, Wenyuan Xu:
CETAD: Detecting evil twin access point attacks in wireless hotspots. CNS 2014: 238-246 - [c24]Hossen Asiful Mustafa, Wenyuan Xu, Ahmad-Reza Sadeghi, Steffen Schulz:
You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks. DSN 2014: 168-179 - [c23]Jubin Zhong, Zhiyun Lin, Zhiyong Chen, Wenyuan Xu:
Cooperative localization using angle-of-arrival information. ICCA 2014: 19-24 - [c22]Tingrui Han, Zhiyun Lin, Wenyuan Xu, Minyue Fu:
Three-dimensional formation merging control of second-order agents under directed and switching topologies. ICCA 2014: 225-230 - [c21]Sanorita Dey, Nirupam Roy, Wenyuan Xu, Romit Roy Choudhury, Srihari Nelakuditi:
AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable. NDSS 2014 - 2013
- [j8]Sanorita Dey, Nirupam Roy, Wenyuan Xu, Srihari Nelakuditi:
ACM HotMobile 2013 poster: leveraging imperfections of sensors for fingerprinting smartphones. ACM SIGMOBILE Mob. Comput. Commun. Rev. 17(3): 21-22 (2013) - [c20]Shane S. Clark, Hossen Asiful Mustafa, Benjamin Ransford, Jacob Sorber, Kevin Fu, Wenyuan Xu:
Current Events: Identifying Webpages by Tapping the Electrical Outlet. ESORICS 2013: 700-717 - [c19]Jing Tian, Chengzhang Qu, Wenyuan Xu, Song Wang:
KinWrite: Handwriting-Based Authentication Using Kinect. NDSS 2013 - [c18]Denis Foo Kune, John D. Backes, Shane S. Clark, Daniel B. Kramer, Matthew R. Reynolds, Kevin Fu, Yongdae Kim, Wenyuan Xu:
Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors. IEEE Symposium on Security and Privacy 2013: 145-159 - [c17]Shane S. Clark, Benjamin Ransford, Amir Rahmati, Shane Guineau, Jacob Sorber, Wenyuan Xu, Kevin Fu:
WattsUpDoc: Power Side Channels to Nonintrusively Discover Untargeted Malware on Embedded Medical Devices. HealthTech 2013 - 2012
- [j7]Guofei Chai, Miao Xu, Wenyuan Xu, Zhiyun Lin:
Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity. Int. J. Distributed Sens. Networks 8 (2012) - [j6]Hossen Asiful Mustafa, Xin Zhang, Zhenhua Liu, Wenyuan Xu, Adrian Perrig:
Jamming-Resilient Multipath Routing. IEEE Trans. Dependable Secur. Comput. 9(6): 852-864 (2012) - [j5]Zhenhua Liu, Hongbo Liu, Wenyuan Xu, Yingying Chen:
Exploiting Jamming-Caused Neighbor Changes for Jammer Localization. IEEE Trans. Parallel Distributed Syst. 23(3): 547-555 (2012) - [c16]Ishtiaq Rouf, Hossen Asiful Mustafa, Miao Xu, Wenyuan Xu, Robert D. Miller, Marco Gruteser:
Neighborhood watch: security and privacy analysis of automatic meter reading systems. CCS 2012: 462-473 - [c15]Jian Hou, Gangfeng Yan, Zhiyun Lin, Wenyuan Xu:
Distributed transmit beamforming via feedback-based inter-cluster synchronization. CDC 2012: 1392-1397 - [c14]Zhenhua Liu, Hongbo Liu, Wenyuan Xu, Yingying Chen:
Error minimizing jammer localization through smart estimation of ambient noise. MASS 2012: 308-316 - [c13]Steffen Schulz, Ahmad-Reza Sadeghi, Maria Zhdanova, Hossen Asiful Mustafa, Wenyuan Xu, Vijay Varadharajan:
Tetherway: a framework for tethering camouflage. WISEC 2012: 149-160 - 2011
- [j4]Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu:
Determining the position of a jammer using a virtual-force iterative approach. Wirel. Networks 17(2): 531-547 (2011) - [c12]Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu:
Localizing Multiple Jamming Attackers in Wireless Networks. ICDCS 2011: 517-528 - 2010
- [c11]Zhenhua Liu, Hongbo Liu, Wenyuan Xu, Yingying Chen:
Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges. DCOSS 2010: 348-361 - [c10]Jian Hou, Zhiyun Lin, Wenyuan Xu, Gangfeng Yan:
Distributed Transmit Beamforming with Autonomous and Self-Organizing Mobile Antennas. GLOBECOM 2010: 1-5 - [c9]Ishtiaq Rouf, Robert D. Miller, Hossen Asiful Mustafa, Travis Taylor, Sangho Oh, Wenyuan Xu, Marco Gruteser, Wade Trappe, Ivan Seskar:
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study. USENIX Security Symposium 2010: 323-338
2000 – 2009
- 2009
- [j3]Pandurang Kamat, Wenyuan Xu, Wade Trappe, Yanyong Zhang:
Temporal privacy in wireless sensor networks: Theory and practice. ACM Trans. Sens. Networks 5(4): 28:1-28:24 (2009) - [c8]Hongbo Liu, Wenyuan Xu, Yingying Chen, Zhenhua Liu:
Localizing Jammers in Wireless Networks. PerCom Workshops 2009: 1-6 - 2008
- [j2]Wenyuan Xu, Wade Trappe, Yanyong Zhang:
Defending wireless sensor networks from radio interference through channel adaptation. ACM Trans. Sens. Networks 4(4): 18:1-18:34 (2008) - [c7]Wenyuan Xu, Wade Trappe, Yanyong Zhang:
Anti-jamming timing channels for wireless networks. WISEC 2008: 203-213 - 2007
- [c6]Pandurang Kamat, Wenyuan Xu, Wade Trappe, Yanyong Zhang:
Temporal Privacy in Wireless Sensor Networks. ICDCS 2007: 23 - [c5]Wenyuan Xu, Wade Trappe, Yanyong Zhang:
Channel surfing: defending wireless sensor networks from interference. IPSN 2007: 499-508 - [c4]Robert D. Miller, Wenyuan Xu, Pandurang Kamat, Wade Trappe:
Service Discovery and Device Identification in Cognitive Radio Networks. SECON 2007: 670-677 - 2006
- [j1]Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang:
Jamming sensor networks: attack and defense strategies. IEEE Netw. 20(3): 41-47 (2006) - [c3]Zang Li, Wenyuan Xu, Robert D. Miller, Wade Trappe:
Securing wireless systems via lower layer enforcements. Workshop on Wireless Security 2006: 33-42 - 2005
- [c2]Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wood:
The feasibility of launching and detecting jamming attacks in wireless networks. MobiHoc 2005: 46-57 - 2004
- [c1]Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang:
Channel surfing and spatial retreats: defenses against wireless denial of service. Workshop on Wireless Security 2004: 80-89
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint