Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS
Chen, Kai, Wang, Xueqiang, Chen, Yi, Wang, Peng, Lee, Yeonjoon, Wang, XiaoFeng, Ma, Bin, Wang, Aohui, Zhang, Yingjun, Zou, Wei
Published in 2016 IEEE Symposium on Security and Privacy (SP) (01.05.2016)
Published in 2016 IEEE Symposium on Security and Privacy (SP) (01.05.2016)
Get full text
Conference Proceeding
Journal Article
Manipulating Users’ Trust on Amazon Echo: Compromising Smart Home from Outside
Chen, Yuxuan, Yuan, Xuejing, Wang, Aohui, Chen, Kai, Zhang, Shengzhi, Huang, Heqing
Published in EAI endorsed transactions on security and safety (18.05.2020)
Published in EAI endorsed transactions on security and safety (18.05.2020)
Get full text
Journal Article
All Your Alexa Are Belong to Us: A Remote Voice Control Attack against Echo
Xuejing Yuan, Yuxuan Chen, Aohui Wang, Kai Chen, Shengzhi Zhang, Heqing Huang, Molloy, Ian M.
Published in 2018 IEEE Global Communications Conference (GLOBECOM) (01.12.2018)
Published in 2018 IEEE Global Communications Conference (GLOBECOM) (01.12.2018)
Get full text
Conference Proceeding
An Inside Look at IoT Malware
Wang, Aohui, Liang, Ruigang, Liu, Xiaokang, Zhang, Yingjun, Chen, Kai, Li, Jin
Published in Industrial IoT Technologies and Applications (2017)
Published in Industrial IoT Technologies and Applications (2017)
Get full text
Book Chapter
Detection of COVID-19 by Cough Sound: A Method Based on DSC + BiLSTM
Meng, Jie, Zhang, Peng, Wang, Jianhua, Wang, Aohui, Zhang, Long
Published in 2022 IEEE 2nd International Conference on Mobile Networks and Wireless Communications (ICMNWC) (02.12.2022)
Published in 2022 IEEE 2nd International Conference on Mobile Networks and Wireless Communications (ICMNWC) (02.12.2022)
Get full text
Conference Proceeding
Research on Control Flow Integrity Scheme for Android Platform
Zheng, Jiesheng, Shen, Wuqiang, Shang, Yanwei, Wang, Aohui, Liang, Ruigang, Li, Jing, Hu, Yiqi, Ni, Donghe
Published in 2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS) (01.12.2019)
Published in 2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS) (01.12.2019)
Get full text
Conference Proceeding
Material adding device
CAO JIANJUN, WANG AOHUI, BO DONG, TIAN XINGKAI, FAN WENFENG, ZHAN HAIYING, DI YUANKANG, SHI FENG
Year of Publication 02.07.2024
Get full text
Year of Publication 02.07.2024
Patent
Control flow integrity checking method and device, and computer storage medium
PENG HUAXI, LIU YINGQING, CHEN KAI, WANG AOHUI, LIANG RUIGANG, XIN JUN
Year of Publication 23.11.2018
Get full text
Year of Publication 23.11.2018
Patent