​
Login / Signup
Xuejing Yuan
Publication Activity (10 Years)
Years Active: 2018-2024
Publications (10 Years): 11
Top Topics
Dimensionality Reduction
Cellular Phone
Smart Home
Tangent Space
Top Venues
CoRR
USENIX Security Symposium
Appl. Intell.
ACM Trans. Priv. Secur.
</>
Publications
</>
Juntao He
,
Haoran Dai
,
Runqi Sui
,
Xuejing Yuan
,
Dun Liu
,
Hao Feng
,
Xinyue Liu
,
Wenchuan Yang
,
Baojiang Cui
,
Kedan Li
EvilPromptFuzzer: generating inappropriate content based on text-to-image models.
Cybersecur.
7 (1) (2024)
Guangnian Wan
,
Haitao Du
,
Xuejing Yuan
,
Jun Yang
,
Meiling Chen
,
Jie Xu
Enhancing Privacy Preservation in Federated Learning via Learning Rate Perturbation.
ICCV
(2023)
Wenxu Gao
,
Zhengming Ma
,
Xuejing Yuan
Dimensionality reduction algorithm of tensor data based on orthogonal tucker decomposition and local discrimination difference.
Appl. Intell.
52 (12) (2022)
Yuxuan Chen
,
Jiangshan Zhang
,
Xuejing Yuan
,
Shengzhi Zhang
,
Kai Chen
,
Xiaofeng Wang
,
Shanqing Guo
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems.
ACM Trans. Priv. Secur.
25 (3) (2022)
Yuxuan Chen
,
Jiangshan Zhang
,
Xuejing Yuan
,
Shengzhi Zhang
,
Kai Chen
,
XiaoFeng Wang
,
Shanqing Guo
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems.
CoRR
(2021)
Xuejing Yuan
,
Xiao Huang
,
Zhengming Ma
SPD Data Dimensionality Reduction based on SPD Manifold Tangent Space and Local LDA.
ICACS
(2021)
Yuxuan Chen
,
Xuejing Yuan
,
Jiangshan Zhang
,
Yue Zhao
,
Shengzhi Zhang
,
Kai Chen
,
XiaoFeng Wang
Devil's Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices.
USENIX Security Symposium
(2020)
Yuxuan Chen
,
Xuejing Yuan
,
Aohui Wang
,
Kai Chen
,
Shengzhi Zhang
,
Heqing Huang
Manipulating Users' Trust on Amazon Echo: Compromising Smart Home from Outside.
EAI Endorsed Trans. Security Safety
6 (22) (2020)
Xuejing Yuan
,
Yuxuan Chen
,
Aohui Wang
,
Kai Chen
,
Shengzhi Zhang
,
Heqing Huang
,
Ian M. Molloy
All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo.
GLOBECOM
(2018)
Xuejing Yuan
,
Yuxuan Chen
,
Yue Zhao
,
Yunhui Long
,
Xiaokang Liu
,
Kai Chen
,
Shengzhi Zhang
,
Heqing Huang
,
Xiaofeng Wang
,
Carl A. Gunter
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition.
CoRR
(2018)
Xuejing Yuan
,
Yuxuan Chen
,
Yue Zhao
,
Yunhui Long
,
Xiaokang Liu
,
Kai Chen
,
Shengzhi Zhang
,
Heqing Huang
,
Xiaofeng Wang
,
Carl A. Gunter
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition.
USENIX Security Symposium
(2018)