Publications

(*: equal contribution)

2024

  • Perception-driven Imperceptible Adversarial Attack against Decision-based Black-box Models
    Shenyi Zhang, Baolin Zheng, Peipei Jiang, Lingchen Zhao, Chao Shen, and Qian Wang
    IEEE Transactions on Information Forensics and Security (TIFS) [PDF]

2023

  • Boomerang: Metadata-Private Messaging under Hardware Trust
    Peipei Jiang, Qian Wang, Jianhao Cheng, Cong Wang, Lei Xu, Xinyu Wang, Yihao Wu, Xiaoyuan Li, and Kui Ren
    NSDI 2023 [PDF] [CODE]

  • Shielding Graph for eXact Analytics with SGX
    Minxin Du, Peipei Jiang, Qian Wang, Sherman S. M. Chow, and Lingchen Zhao
    IEEE Transactions on Dependable and Secure Computing (TDSC) [PDF]

2022

  • Securing Liveness Detection for Voice Authentication via Pop Noises
    Peipei Jiang, Qian Wang, Xiu Lin, Man Zhou, Wenbing Ding, Cong Wang, Chao Shen, and Qi Li
    IEEE Transactions on Dependable and Secure Computing (TDSC) [PDF]

  • SoundID: Securing Mobile Two-Factor Authentication via Acoustic Signals
    Dan Liu, Qian Wang, Man Zhou, Peipei Jiang, Qi Li, Chao Shen, and Cong Wang
    IEEE Transactions on Dependable and Secure Computing (TDSC) [PDF]

  • PressPIN: Enabling Secure PIN Authentication on Mobile Devices via Structure-Borne Sounds
    Man Zhou, Qian Wang, Xiu Lin, Yi Zhao, Peipei Jiang, Qi Li, Chao Shen, and Cong Wang
    IEEE Transactions on Dependable and Secure Computing (TDSC) [PDF]

  • GraphShield: Dynamic Large Graphs for Secure Queries with Forward Privacy
    Minxin Du, Shuangke Wu, Qian Wang, Dian Chen, Peipei Jiang, and Aziz Mohaisen
    IEEE Transactions on Knowledge and Data Engineering (TKDE) [PDF]

2021

  • Building In-the-Cloud Network Functions: Security and Privacy Challenges
    Peipei Jiang, Qian Wang, Muqi Huang, Cong Wang, Qi Li, Chao Shen, and Kui Ren
    Proceedings of the IEEE [PDF]

  • Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information
    Baolin Zheng*, Peipei Jiang*, Qian Wang, Qi Li, Chao Shen, Cong Wang, Yunjie Ge, Qingyang Teng, and Shenyi Zhang
    CCS 2021 [PDF]

  • Stealing Your Android Patterns via Acoustic Signals
    Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Peipei Jiang, Yanjiao Chen, and Zhibo Wang
    IEEE Transactions on Mobile Computing (TMC) [PDF]