Follow
Cong Shi
Cong Shi
Verified email at scarletmail.rutgers.edu - Homepage
Title
Cited by
Cited by
Year
Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT
C Shi, J Liu, H Liu, Y Chen
Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc …, 2017
1942017
WiFi-enabled smart human dynamics monitoring
X Guo, B Liu, C Shi, H Liu, Y Chen, MC Chuah
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 1-13, 2017
472017
Real-time, universal, and robust adversarial attacks against speaker recognition systems
Y Xie, C Shi, Z Li, J Liu, Y Chen, B Yuan
ICASSP 2020-2020 IEEE international conference on acoustics, speech and …, 2020
412020
Device-free personalized fitness assistant using WiFi
X Guo, J Liu, C Shi, H Liu, Y Chen, MC Chuah
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018
412018
Practical adversarial attacks against speaker recognition systems
Z Li, C Shi, Y Xie, J Liu, B Yuan, Y Chen
Proceedings of the 21st international workshop on mobile computing systems …, 2020
302020
Improvement of the depth resolution in depth-resolved wavenumber-scanning interferometry using multiple uncorrelated wavenumber bands
J Xu, Y Liu, B Dong, Y Bai, L Hu, C Shi, Z Xu, Y Zhou
Applied Optics 52 (20), 4890-4897, 2013
212013
Enabling fast and universal audio adversarial attack using generative model
Y Xie, Z Li, C Shi, J Liu, Y Chen, B Yuan
Proceedings of the AAAI Conference on Artificial Intelligence 35 (16), 14129 …, 2021
162021
CardioCam: Leveraging Camera on Mobile Devices to Verify Users While Their Heart is Pumping
J Liu, C Shi, Y Chen, H Liu, M Gruteser
Proceedings of the 17th Annual International Conference on Mobile Systems …, 2019
112019
Secret key distribution leveraging color shift over visible light channel
H Liu, B Liu, C Shi, Y Chen
2017 IEEE Conference on Communications and Network Security (CNS), 1-9, 2017
52017
Wifi-enabled user authentication through deep learning in daily activities
C Shi, J Liu, H Liu, Y Chen
ACM Transactions on Internet of Things 2 (2), 1-25, 2021
42021
WearID: Wearable-Assisted Low-Effort Authentication to Voice Assistants using Cross-Domain Speech Similarity
C Wang, C Shi, Y Chen, Y Wang, N Saxena
arXiv preprint arXiv:2003.09083, 2020
42020
Robust detection of machine-induced audio attacks in intelligent audio systems with microphone array
Z Li, C Shi, T Zhang, Y Xie, J Liu, B Yuan, Y Chen
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
32021
WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training
C Shi, Y Wang, Y Chen, N Saxena, C Wang
Annual Computer Security Applications Conference, 829–842, 2020
32020
Simultaneous Monitoring of Multiple People’s Vital Sign Leveraging a Single Phased-MIMO Radar
Z Xu, C Shi, T Zhang, S Li, Y Yuan, CTM Wu, Y Chen, A Petropulu
IEEE Journal of Electromagnetics, RF and Microwaves in Medicine and Biology, 2022
22022
Real-time, robust and adaptive universal adversarial attacks against speaker recognition systems
Y Xie, Z Li, C Shi, J Liu, Y Chen, B Yuan
Journal of Signal Processing Systems 93 (10), 1187-1200, 2021
22021
Towards environment-independent behavior-based user authentication using wifi
C Shi, J Liu, N Borodinov, B Leao, Y Chen
2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems …, 2020
22020
Authentication of voice commands by leveraging vibrations in wearables
C Shi, Y Wang, YJ Chen, N Saxena
IEEE Security & Privacy 19 (6), 83-92, 2021
12021
Enabling secret key distribution over screen-to-camera channel leveraging color shift property
H Liu, C Shi, Y Chen
IEEE Transactions on Mobile Computing, 2021
12021
Multiresolution mutual information method for social network entity resolution
C Shi, D Rong
2015 IEEE International Conference on Data Mining Workshop (ICDMW), 240-247, 2015
12015
Speech privacy attack via vibrations from room objects leveraging a phased-MIMO radar
C Shi, T Zhang, Z Xu, S Li, Y Yuan, A Petropulu, CTM Wu, Y Chen
Proceedings of the 20th Annual International Conference on Mobile Systems …, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20