Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Xiaoyu Ji is active.

Publication


Featured researches published by Xiaoyu Ji.


computer and communications security | 2017

DolphinAttack: Inaudible Voice Commands

Guoming Zhang; Chen Yan; Xiaoyu Ji; Taimin Zhang; Tianchen Zhang; Wenyuan Xu

Speech recognition (SR) systems such as Siri or Google Now have become an increasingly popular human-computer interaction method, and have turned various systems into voice controllable systems (VCS). Prior work on attacking VCS shows that the hidden voice commands that are incomprehensible to people can control the systems. Hidden voice commands, though hidden, are nonetheless audible. In this work, we design a totally inaudible attack, DolphinAttack, that modulates voice commands on ultrasonic carriers (e.g., f > 20 kHz) to achieve inaudibility. By leveraging the nonlinearity of the microphone circuits, the modulated low-frequency audio commands can be successfully demodulated, recovered, and more importantly interpreted by the speech recognition systems. We validated DolphinAttack on popular speech recognition systems, including Siri, Google Now, Samsung S Voice, Huawei HiVoice, Cortana and Alexa. By injecting a sequence of inaudible voice commands, we show a few proof-of-concept attacks, which include activating Siri to initiate a FaceTime call on iPhone, activating Google Now to switch the phone to the airplane mode, and even manipulating the navigation system in an Audi automobile. We propose hardware and software defense solutions, and suggest to re-design voice controllable systems to be resilient to inaudible voice command attacks.


international conference on computer communications | 2014

Walking down the STAIRS: Efficient collision resolution for wireless sensor networks

Xiaoyu Ji; Jiliang Wang; Wei Dong; Xiaopei Wu; Yunhao Liu

Collision resolution is a crucial issue in wireless sensor networks. The existing approaches of collision resolution have drawbacks with respect to energy efficiency and processing latency. In this paper, we propose ST AIRS, a time and energy efficient collision resolution mechanism for wireless sensor networks. STAIRS incorporates the constructive interference technique in its design and explicitly forms superimposed colliding signals. Through extensive observations and theoretical analysis, we show that the RSSI of the superimposed signals exhibit stairs-like phenomenon with different number of contenders. That principle offers an attractive feature to efficiently distinguish multiple contenders and in turn makes collision-free schedules for channel access. In the design and implementation of STAIRS, we address practical challenges such as contenders alignment, online detection of RSSI change points, and fast channel assignment. The experiments on real testbed show that STARIS realizes fast and effective collision resolution, which significantly improves the network performance in terms of both latency and throughput.


international conference on network protocols | 2013

Voice over the dins: Improving wireless channel utilization with collision tolerance

Xiaoyu Ji; Jiliang Wang; Kaishun Wu; Ke Yi; Yunhao Liu

Packet corruption caused by collision is a critical problem that hurts the performance of wireless networks. Conventional medium access control (MAC) protocols resort to collision avoidance to maintain acceptable efficiency of channel utilization. According to our investigation and observation, however, collision avoidance comes at the cost of miscellaneous overhead, which oppositely hurts channel utilization, not to mention the poor resiliency and performance of those protocols in face of dense networks or intensive traffic. Discovering the ability to tolerate collisions at the physical layer implementations of wireless networks, we in this paper propose Coco, a MAC protocol that advocates simultaneous accesses from multiple senders to a shared channel, i.e., optimistically allowing collisions instead of simply avoiding them. With a simple but effective design, Coco addresses the key challenges in achieving collision tolerance, such as precise sender alignment and fine control of the transmission concurrency. We implement Coco in 802.15.4 networks and evaluate its performance through extensive experiments with 21 TelosB nodes. The results demonstrate that Coco is light-weight and enhances channel utilization by at least 20% in general cases, compared with state-of-the-arts protocols.


IEEE Transactions on Mobile Computing | 2017

On Improving Wireless Channel Utilization: A Collision Tolerance-Based Approach

Xiaoyu Ji; Jiliang Wang; Kaishun Wu; Daibo Liu; Ke Yi; Yunhao Liu

Packet corruption caused by collision is a critical problem that hurts the performance of wireless networks. Conventional medium access control (MAC) protocols resort to collision avoidance to maintain acceptable efficiency of channel utilization. According to our investigation and observation, however, collision avoidance comes at the cost of miscellaneous overhead, which oppositely hurts channel utilization, not to mention the poor resiliency and performance of those protocols in face of dense networks or intensive traffic. Discovering the ability to tolerate collisions at the physical layer implementations of wireless networks, we in this paper propose <inline-formula> <tex-math notation=LaTeX>


tangible and embedded interaction | 2010

Music-touch shoes: vibrotactile interface for hearing impaired dancers

Lining Yao; Yan Shi; Hengfeng Chi; Xiaoyu Ji; Fangtian Ying

Coco


international conference on computer communications | 2014

Hitchhike: Riding control on preambles

Xiaoyu Ji; Jiliang Wang; Mingyan Liu; Yubo Yan; Panlong Yang; Yunhao Liu

</tex-math><alternatives><inline-graphic xlink:href=ji-ieq1-2567380.gif/> </alternatives></inline-formula>, a protocol that advocates simultaneous accesses from multiple senders to a shared channel, i.e., optimistically allowing collisions instead of simply avoiding them. With a simple but effective design, <inline-formula><tex-math notation=LaTeX>


trust security and privacy in computing and communications | 2014

ToAuth: Towards Automatic Near Field Authentication for Smartphones

Weixi Gu; Zheng Yang; Longfei Shangguan; Xiaoyu Ji; Yiyang Zhao

Coco


IEEE Transactions on Wireless Communications | 2016

Hitchhike: A Preamble-Based Control Plane for SNR-Sensitive Wireless Networks

Xiaoyu Ji; Jiliang Wang; Mingyan Liu; Yubo Yan; Panlong Yang; Yunhao Liu

</tex-math><alternatives> <inline-graphic xlink:href=ji-ieq2-2567380.gif/></alternatives></inline-formula> addresses the key challenges in achieving collision tolerance, such as precise sender alignment and the control of transmission concurrency. We implement <inline-formula><tex-math notation=LaTeX>


IEEE Transactions on Mobile Computing | 2016

Privacy-Aware High-Quality Map Generation with Participatory Sensing

Xi Chen; Xiaopei Wu; Xiang-Yang Li; Xiaoyu Ji; Yunhao Liu

Coco


international conference on distributed computing systems | 2015

Tele Adjusting: Using Path Coding and Opportunistic Forwarding for Remote Control in WSNs

Daibo Liu; Zhichao Cao; Xiaopei Wu; Xiaoyu Ji; Mengshu Hou

</tex-math><alternatives> <inline-graphic xlink:href=ji-ieq3-2567380.gif/></alternatives></inline-formula> in 802.15.4 networks and evaluate its performance through extensive experiments with 21 TelosB nodes. The results demonstrate that <inline-formula> <tex-math notation=LaTeX>

Collaboration


Dive into the Xiaoyu Ji's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Daibo Liu

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yi-Chao Chen

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge