What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Zhongjie Ba
Google Scholar
ORCID:
0000-0003-0921-8869
26
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
From One Stolen Utterance: Assessing the Risks of Voice Cloning in the AIGC Era.
Kun Wang
Meng Chen
Li Lu
Jingwen Feng
Qianniu Chen
Zhongjie Ba
Kui Ren
Chun Chen
2025
journals/tifs
Liquid Crystal Mimics Your Heart: A Physical Spoofing Attack Against PPG-Based Systems.
Junhao Wang
Li Lu
Hao Kong
Feng Lin
Zhongjie Ba
Kui Ren
2025
conf/uss
Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models.
Yu He
Boheng Li
Liu Liu
Zhongjie Ba
Wei Dong
Yiming Li
Zhan Qin
Kui Ren
Chun Chen
2024
journals/tifs
AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception.
Meng Chen
Li Lu
Jiadi Yu
Zhongjie Ba
Feng Lin
Kui Ren
2024
journals/tifs
PhaDe: Practical Phantom Spoofing Attack Detection for Autonomous Vehicles.
Feng Lin
Hao Yan
Jin Li
Ziwei Liu
Li Lu
Zhongjie Ba
Kui Ren
2024
journals/tifs
Indelible "Footprints" of Inaudible Command Injection.
Zhongjie Ba
Bin Gong
Yuwei Wang
Yuxuan Liu
Peng Cheng
Feng Lin
Li Lu
Kui Ren
2024
journals/tifs
FLTracer: Accurate Poisoning Attack Provenance in Federated Learning.
Xinyu Zhang
Qingyu Liu
Zhongjie Ba
Yuan Hong
Tianhang Zheng
Feng Lin
Li Lu
Kui Ren
2024
conf/ccs
SurrogatePrompt: Bypassing the Safety Filter of Text-to-Image Models via Substitution.
Zhongjie Ba
Jieming Zhong
Jiachen Lei
Peng Cheng
Qinglong Wang
Zhan Qin
Zhibo Wang
Kui Ren
2024
conf/ccs
Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence.
Hanbin Hong
Xinyu Zhang
Binghui Wang
Zhongjie Ba
Yuan Hong
2024
conf/ccs
ProFake: Detecting Deepfakes in the Wild against Quality Degradation with Progressive Quality-adaptive Learning.
Huiyu Xu
Yaopeng Wang
Zhibo Wang
Zhongjie Ba
Wenxin Liu
Lu Jin
Haiqin Weng
Tao Wei
Kui Ren
2024
conf/uss
MicGuard: A Comprehensive Detection System against Out-of-band Injection Attacks for Different Level Microphone-based Devices.
Tiantian Liu
Feng Lin
Zhongjie Ba
Li Lu
Zhan Qin
Kui Ren
2024
conf/uss
FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition.
Kun Wang
Xiangyu Xu
Li Lu
Zhongjie Ba
Feng Lin
Kui Ren
2024
conf/uss
FaceObfuscator: Defending Deep Learning-based Privacy Attacks with Gradient Descent-resistant Features in Face Recognition.
Shuaifan Jin
He Wang
Zhibo Wang
Feng Xiao
Jiahui Hu
Yuan He
Wenwen Zhang
Zhongjie Ba
Weijie Fang
Shuhong Yuan
Kui Ren
2024
conf/uss
Devil in the Room: Triggering Audio Backdoors in the Physical World.
Meng Chen
Xiangyu Xu
Li Lu
Zhongjie Ba
Feng Lin
Kui Ren
2024
conf/sp
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks.
Xinyu Zhang
Hanbin Hong
Yuan Hong
Peng Huang
Binghui Wang
Zhongjie Ba
Kui Ren
2024
conf/sp
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features.
Peng Cheng
Yuwei Wang
Peng Huang
Zhongjie Ba
Xiaodong Lin
Feng Lin
Li Lu
Kui Ren
2023
journals/tifs
AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake.
Wenyuan Yang
Xiaoyu Zhou
Zhikai Chen
Bofei Guo
Zhongjie Ba
Zhihua Xia
Xiaochun Cao
Kui Ren
2023
conf/ccs
FITS: Matching Camera Fingerprints Subject to Software Noise Pollution.
Liu Liu
Xinwen Fu
Xiaodong Chen
Jianpeng Wang
Zhongjie Ba
Feng Lin
Li Lu
Kui Ren
2023
conf/sp
MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.
Tiantian Liu
Feng Lin
Zhangsen Wang
Chao Wang
Zhongjie Ba
Li Lu
Wenyao Xu
Kui Ren
2023
conf/ndss
InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise.
Peng Huang
Yao Wei
Peng Cheng
Zhongjie Ba
Li Lu
Feng Lin
Fan Zhang
Kui Ren
2022
conf/ccs
Poster: Cryptographic Inferences for Video Deep Neural Networks.
Bingyu Liu
Rujia Wang
Zhongjie Ba
Shanglin Zhou
Caiwen Ding
Yuan Hong
2021
journals/tifs
Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems.
Qian Wang
Baolin Zheng
Qi Li
Chao Shen
Zhongjie Ba
2020
conf/ndss
Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer.
Zhongjie Ba
Tianhang Zheng
Xinyu Zhang
Zhan Qin
Baochun Li
Xue Liu
Kui Ren
2019
journals/tifs
CIM: Camera in Motion for Smartphone Authentication.
Zhongjie Ba
Zhan Qin
Xinwen Fu
Kui Ren
2018
conf/ndss
ABC: Enabling Smartphone Authentication with Built-in Camera.
Zhongjie Ba
Sixu Piao
Xinwen Fu
Dimitrios Koutsonikolas
Aziz Mohaisen
Kui Ren
2016
conf/ccs
My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers.
Chen Song
Feng Lin
Zhongjie Ba
Kui Ren
Chi Zhou
Wenyao Xu
Coauthors
Aziz Mohaisen
(1)
Baochun Li
(1)
Baolin Zheng
(1)
Bin Gong
(1)
Binghui Wang
(2)
Bingyu Liu
(1)
Bofei Guo
(1)
Boheng Li
(1)
Caiwen Ding
(1)
Chao Shen
(1)
Chao Wang
(1)
Chen Song
(1)
Chi Zhou
(1)
Chun Chen
(2)
Dimitrios Koutsonikolas
(1)
Fan Zhang
(1)
Feng Lin
(13)
Feng Xiao
(1)
Haiqin Weng
(1)
Hanbin Hong
(2)
Hao Kong
(1)
Hao Yan
(1)
He Wang
(1)
Huiyu Xu
(1)
Jiachen Lei
(1)
Jiadi Yu
(1)
Jiahui Hu
(1)
Jianpeng Wang
(1)
Jieming Zhong
(1)
Jin Li
(1)
Jingwen Feng
(1)
Junhao Wang
(1)
Kui Ren
(23)
Kun Wang
(2)
Li Lu
(13)
Liu Liu
(2)
Lu Jin
(1)
Meng Chen
(3)
Peng Cheng
(4)
Peng Huang
(3)
Qi Li
(1)
Qian Wang
(1)
Qianniu Chen
(1)
Qinglong Wang
(1)
Qingyu Liu
(1)
Rujia Wang
(1)
Shanglin Zhou
(1)
Shuaifan Jin
(1)
Shuhong Yuan
(1)
Sixu Piao
(1)
Tao Wei
(1)
Tianhang Zheng
(2)
Tiantian Liu
(2)
Wei Dong
(1)
Weijie Fang
(1)
Wenwen Zhang
(1)
Wenxin Liu
(1)
Wenyao Xu
(2)
Wenyuan Yang
(1)
Xiangyu Xu
(2)
Xiaochun Cao
(1)
Xiaodong Chen
(1)
Xiaodong Lin
(1)
Xiaoyu Zhou
(1)
Xinwen Fu
(3)
Xinyu Zhang
(4)
Xue Liu
(1)
Yao Wei
(1)
Yaopeng Wang
(1)
Yiming Li
(1)
Yu He
(1)
Yuan He
(1)
Yuan Hong
(4)
Yuwei Wang
(2)
Yuxuan Liu
(1)
Zhan Qin
(5)
Zhangsen Wang
(1)
Zhibo Wang
(3)
Zhihua Xia
(1)
Zhikai Chen
(1)
Zhongjie Ba
(26)
Ziwei Liu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to