Blind recognition of touched keys on mobile devices Q Yue, Z Ling, X Fu, B Liu, K Ren, W Zhao Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 104 | 2014 |
The peeping eye in the sky Q Yue, Z Li, C Gao, W Yu, X Fu, W Zhao 2018 IEEE Global Communications Conference (GLOBECOM), 1-7, 2018 | 80 | 2018 |
My google glass sees your passwords Q Yue, Z Ling, X Fu, B Liu, W Yu, W Zhao Proceedings of the Black Hat USA, 2014 | 38 | 2014 |
Toward drone privacy via regulating altitude and payload Z Li, C Gao, Q Yue, X Fu 2019 International Conference on Computing, Networking and Communications …, 2019 | 20 | 2019 |
Blind recognition of touched keys: Attack and countermeasures Q Yue, Z Ling, B Liu, X Fu, W Zhao arXiv preprint arXiv:1403.4829, 2014 | 14 | 2014 |
Secure fingertip mouse for mobile devices Z Ling, J Luo, Q Chen, Q Yue, M Yang, W Yu, X Fu IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 12 | 2016 |
Blind recognition of text input on mobile devices via natural language processing Q Yue, Z Ling, W Yu, B Liu, X Fu Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, 19-24, 2015 | 10 | 2015 |
3D vision attack against authentication Z Li, Q Yue, C Sano, W Yu, X Fu 2017 IEEE International Conference on Communications (ICC), 1-6, 2017 | 6 | 2017 |
Some improvements to the cost-based framework for analyzing denial of service attacks Q Yue, F Liu, R Xue Trusted Systems: Third International Conference, INTRUST 2011, Beijing …, 2012 | 1 | 2012 |
Motion based side channels against mobile devices Q Yue University of Massachusetts Lowell, 2017 | | 2017 |
Formal Methods for Protocol Modeling Based on State Transition Systems Q Yue Institute of Software, Chinese Academy of Sciences, 2012 | | 2012 |