​
Login / Signup
Jiangyi Deng
ORCID
Publication Activity (10 Years)
Years Active: 2019-2024
Publications (10 Years): 10
Top Topics
Factor Authentication
Remote Server
Key Agreement
Secure Manner
Top Venues
CoRR
USENIX Security Symposium
IEEE Trans. Mob. Comput.
CCS
</>
Publications
</>
Xinfeng Li
,
Yuchen Yang
,
Jiangyi Deng
,
Chen Yan
,
Yanjiao Chen
,
Xiaoyu Ji
,
Wenyuan Xu
SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models.
CoRR
(2024)
Jiangyi Deng
,
Shengyuan Pang
,
Yanjiao Chen
,
Liangming Xia
,
Yijie Bai
,
Haiqin Weng
,
Wenyuan Xu
SOPHON: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models.
CoRR
(2024)
Jiangyi Deng
,
Xiaoyu Ji
,
Beibei Wang
,
Bin Wang
,
Wenyuan Xu
Dr. Defender: Proactive Detection of Autopilot Drones Based on CSI.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Jiangyi Deng
,
Yanjiao Chen
,
Yinan Zhong
,
Qianhao Miao
,
Xueluan Gong
,
Wenyuan Xu
Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion.
CoRR
(2023)
Jiangyi Deng
,
Fei Teng
,
Yanjiao Chen
,
Xiaofu Chen
,
Zhaohui Wang
,
Wenyuan Xu
V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization.
USENIX Security Symposium
(2023)
Jiangyi Deng
,
Yanjiao Chen
,
Yinan Zhong
,
Qianhao Miao
,
Xueluan Gong
,
Wenyuan Xu
Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion.
USENIX Security Symposium
(2023)
Jiangyi Deng
,
Yanjiao Chen
,
Wenyuan Xu
FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems.
CCS
(2022)
Xiaoyu Ji
,
Xinyan Zhou
,
Chen Yan
,
Jiangyi Deng
,
Wenyuan Xu
A Nonlinearity-Based Secure Face-to-Face Device Authentication for Mobile Devices.
IEEE Trans. Mob. Comput.
21 (4) (2022)
Jiangyi Deng
,
Fei Teng
,
Yanjiao Chen
,
Xiaofu Chen
,
Zhaohui Wang
,
Wenyuan Xu
V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization.
CoRR
(2022)
Xinyan Zhou
,
Xiaoyu Ji
,
Chen Yan
,
Jiangyi Deng
,
Wenyuan Xu
NAuth: Secure Face-to-Face Device Authentication via Nonlinearity.
INFOCOM
(2019)