Loading...
The system can't perform the operation now. Try again later.
Citations per year
Duplicate citations
The following articles are merged in Scholar. Their
combined citations
are counted only for the first article.
Merged citations
This "Cited by" count includes citations to the following articles in Scholar. The ones marked
*
may be different from the article in the profile.
Add co-authors
Co-authors
Follow
New articles by this author
New citations to this author
New articles related to this author's research
Email address for updates
Done
My profile
My library
Metrics
Alerts
Settings
Sign in
Sign in
Get my own profile
Cited by
All
Since 2019
Citations
477
466
h-index
4
4
i10-index
4
4
0
140
70
35
105
2018
2019
2020
2021
2022
2023
2024
8
29
62
90
131
128
26
Public access
View all
View all
3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Shengzhi Zhang
Boston University MET College
Verified email at bu.edu
Kai Chen
Institute of Information Engineering, Chinese Academy of Sciences
Verified email at iie.ac.cn
Yuxuan Chen
Shandong University
Verified email at sdu.edu.cn
XiaoFeng Wang
James H. Rudy Professor of Computer Science, Indiana University at Bloomington
Verified email at indiana.edu
Yue Zhao
University of Chinese Academy of Sciences
Verified email at iie.ac.cn
Yunhui Long
University of Illinois at Urbana-Champaign
Verified email at illinois.edu
Heqing Huang
Affiliate Professor UCAS;Watson and AI Lab
Follow
Xuejing Yuan
School of Cyberspace Security,
Beijing University of Posts and Telecommunications
, Beijing 100876
Verified email at bupt.edu.cn
Articles
Cited by
Public access
Co-authors
Title
Sort
Sort by citations
Sort by year
Sort by title
Cited by
Cited by
Year
{CommanderSong}: A systematic approach for practical adversarial voice recognition
X Yuan, Y Chen, Y Zhao, Y Long, X Liu, K Chen, S Zhang, H Huang, ...
27th USENIX security symposium (USENIX security 18), 49-64
, 2018
273
2018
{Devil’s} whisper: A general approach for physical adversarial attacks against commercial black-box speech recognition devices
Y Chen, X Yuan, J Zhang, Y Zhao, S Zhang, K Chen, XF Wang
29th USENIX Security Symposium (USENIX Security 20), 2667-2684
, 2020
143
2020
All your alexa are belong to us: A remote voice control attack against echo
X Yuan, Y Chen, A Wang, K Chen, S Zhang, H Huang, IM Molloy
2018 IEEE global communications conference (GLOBECOM), 1-6
, 2018
45
2018
Sok: A modularized approach to study the security of automatic speech recognition systems
Y Chen, J Zhang, X Yuan, S Zhang, K Chen, X Wang, S Guo
ACM Transactions on Privacy and Security 25 (3), 1-31
, 2022
13
2022
Manipulating users’ trust on Amazon echo: Compromising smart home from outside
Y Chen, X Yuan, A Wang, K Chen, S Zhang, H Huang
EAI Endorsed Transactions on Security and Safety 6 (22)
, 2020
3
2020
Adversarial Attacks Against Deep Learning-Based Speech Recognition Systems
X Yuan, Y Chen, K Chen, S Zhang, XF Wang
Cyber Security Meets Machine Learning, 99-127
, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–6
Show more
Privacy
Terms
Help
About Scholar
Search help