Xiaoyu Ji
Zhejiang University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Xiaoyu Ji.
computer and communications security | 2017
Guoming Zhang; Chen Yan; Xiaoyu Ji; Taimin Zhang; Tianchen Zhang; Wenyuan Xu
Speech recognition (SR) systems such as Siri or Google Now have become an increasingly popular human-computer interaction method, and have turned various systems into voice controllable systems (VCS). Prior work on attacking VCS shows that the hidden voice commands that are incomprehensible to people can control the systems. Hidden voice commands, though hidden, are nonetheless audible. In this work, we design a totally inaudible attack, DolphinAttack, that modulates voice commands on ultrasonic carriers (e.g., f > 20 kHz) to achieve inaudibility. By leveraging the nonlinearity of the microphone circuits, the modulated low-frequency audio commands can be successfully demodulated, recovered, and more importantly interpreted by the speech recognition systems. We validated DolphinAttack on popular speech recognition systems, including Siri, Google Now, Samsung S Voice, Huawei HiVoice, Cortana and Alexa. By injecting a sequence of inaudible voice commands, we show a few proof-of-concept attacks, which include activating Siri to initiate a FaceTime call on iPhone, activating Google Now to switch the phone to the airplane mode, and even manipulating the navigation system in an Audi automobile. We propose hardware and software defense solutions, and suggest to re-design voice controllable systems to be resilient to inaudible voice command attacks.
international conference on computer communications | 2014
Xiaoyu Ji; Jiliang Wang; Wei Dong; Xiaopei Wu; Yunhao Liu
Collision resolution is a crucial issue in wireless sensor networks. The existing approaches of collision resolution have drawbacks with respect to energy efficiency and processing latency. In this paper, we propose ST AIRS, a time and energy efficient collision resolution mechanism for wireless sensor networks. STAIRS incorporates the constructive interference technique in its design and explicitly forms superimposed colliding signals. Through extensive observations and theoretical analysis, we show that the RSSI of the superimposed signals exhibit stairs-like phenomenon with different number of contenders. That principle offers an attractive feature to efficiently distinguish multiple contenders and in turn makes collision-free schedules for channel access. In the design and implementation of STAIRS, we address practical challenges such as contenders alignment, online detection of RSSI change points, and fast channel assignment. The experiments on real testbed show that STARIS realizes fast and effective collision resolution, which significantly improves the network performance in terms of both latency and throughput.
international conference on network protocols | 2013
Xiaoyu Ji; Jiliang Wang; Kaishun Wu; Ke Yi; Yunhao Liu
Packet corruption caused by collision is a critical problem that hurts the performance of wireless networks. Conventional medium access control (MAC) protocols resort to collision avoidance to maintain acceptable efficiency of channel utilization. According to our investigation and observation, however, collision avoidance comes at the cost of miscellaneous overhead, which oppositely hurts channel utilization, not to mention the poor resiliency and performance of those protocols in face of dense networks or intensive traffic. Discovering the ability to tolerate collisions at the physical layer implementations of wireless networks, we in this paper propose Coco, a MAC protocol that advocates simultaneous accesses from multiple senders to a shared channel, i.e., optimistically allowing collisions instead of simply avoiding them. With a simple but effective design, Coco addresses the key challenges in achieving collision tolerance, such as precise sender alignment and fine control of the transmission concurrency. We implement Coco in 802.15.4 networks and evaluate its performance through extensive experiments with 21 TelosB nodes. The results demonstrate that Coco is light-weight and enhances channel utilization by at least 20% in general cases, compared with state-of-the-arts protocols.
IEEE Transactions on Mobile Computing | 2017
Xiaoyu Ji; Jiliang Wang; Kaishun Wu; Daibo Liu; Ke Yi; Yunhao Liu
Packet corruption caused by collision is a critical problem that hurts the performance of wireless networks. Conventional medium access control (MAC) protocols resort to collision avoidance to maintain acceptable efficiency of channel utilization. According to our investigation and observation, however, collision avoidance comes at the cost of miscellaneous overhead, which oppositely hurts channel utilization, not to mention the poor resiliency and performance of those protocols in face of dense networks or intensive traffic. Discovering the ability to tolerate collisions at the physical layer implementations of wireless networks, we in this paper propose <inline-formula> <tex-math notation=LaTeX>
tangible and embedded interaction | 2010
Lining Yao; Yan Shi; Hengfeng Chi; Xiaoyu Ji; Fangtian Ying
Coco
international conference on computer communications | 2014
Xiaoyu Ji; Jiliang Wang; Mingyan Liu; Yubo Yan; Panlong Yang; Yunhao Liu
</tex-math><alternatives><inline-graphic xlink:href=ji-ieq1-2567380.gif/> </alternatives></inline-formula>, a protocol that advocates simultaneous accesses from multiple senders to a shared channel, i.e., optimistically allowing collisions instead of simply avoiding them. With a simple but effective design, <inline-formula><tex-math notation=LaTeX>
trust security and privacy in computing and communications | 2014
Weixi Gu; Zheng Yang; Longfei Shangguan; Xiaoyu Ji; Yiyang Zhao
Coco
IEEE Transactions on Wireless Communications | 2016
Xiaoyu Ji; Jiliang Wang; Mingyan Liu; Yubo Yan; Panlong Yang; Yunhao Liu
</tex-math><alternatives> <inline-graphic xlink:href=ji-ieq2-2567380.gif/></alternatives></inline-formula> addresses the key challenges in achieving collision tolerance, such as precise sender alignment and the control of transmission concurrency. We implement <inline-formula><tex-math notation=LaTeX>
IEEE Transactions on Mobile Computing | 2016
Xi Chen; Xiaopei Wu; Xiang-Yang Li; Xiaoyu Ji; Yunhao Liu
Coco
international conference on distributed computing systems | 2015
Daibo Liu; Zhichao Cao; Xiaopei Wu; Xiaoyu Ji; Mengshu Hou
</tex-math><alternatives> <inline-graphic xlink:href=ji-ieq3-2567380.gif/></alternatives></inline-formula> in 802.15.4 networks and evaluate its performance through extensive experiments with 21 TelosB nodes. The results demonstrate that <inline-formula> <tex-math notation=LaTeX>