One Cycle Attack: Fool Sensor-Based Personal Gait Authentication With Clustering T Zhu, L Fu, Q Liu, Z Lin, Y Chen, T Chen IEEE Transactions on Information Forensics and Security 16, 553-568, 2020 | 19 | 2020 |
EspialCog: General, Efficient and Robust Mobile User Implicit Authentication in Noisy Environment T Zhu, Z Weng, Q Song, Y Chen, Q Liu, Y Chen, M Lv, T Chen IEEE Transactions on Mobile Computing 21 (2), 555-572, 2020 | 5 | 2020 |
ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels M Jiang, L Ma, Y Zhou, Q Liu, C Zhang, Z Wang, X Luo, L Wu, K Ren CCS 2021, 2021 | 2 | 2021 |
FIRMGUIDE: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution Q Liu, C Zhang, L Ma, M Jiang, Y Zhou, L Wu, W Shen, X Luo, Y Liu, ... ASE 2021, 2021 | 2 | 2021 |