[SECURITY 23’ SingAttack: Remote Attacks on Speech Recognition Systems Using Sound from Power Supply.]
[NSDI 23’ Acoustic Sensing and Communication Using Metasurface. ]
[SECON 23’ AUDIOSENSE: Leveraging Current to Acoustic Channel to Detect Appliances at Single-Point]
[SECON 23’ MAGDEFENDER: Detecting Eavesdropping on Mobile Devices using the Built-in Magnetometer. ]
[WUT 22’ LeakPrint: Leakage or Identification: Behavior-irrelevant User Identification Leveraging Leakage Current on Laptops.]
[TMC 22’ Handwriting Recognition System Leveraging Vibration Signal on Smartphones. ]
[SECON 21’ MagThief: Stealing Private App Usage Data on Mobile Devices via Built-in Magnetometer.]
[INFOCOM 20’ MagPrint: Deep Learning Based User Fingerprinting Using Electromagnetic Signals.]
[UBICOPM 20’ Appliance Fingerprinting Using Sound from Power Supply.]
[MOBICOM 19’mQRCode: Secure QR Code Using Nonlinearity of Spatial Frequency in Light. ]
[VNC 18’ Hand-free Gesture Recognition for Vehicle Infotainment System Control.]