Mingtian Tan, Junpeng Wan, Zhe Zhou, Zhou Li. Invisible Probe: Timing Attacks with PCIe Congestion Side-channel. (Oakland’21)
Junyi Wei, Yicheng Zhang, Zhe Zhou, Zhou Li, Mohammad Abdullah Al Faruque. Leaky DNN: Stealing Deep-learning Model Secret with GPU Context-switching Side-channel. (DSN’20)
Di Tang, Zhe Zhou, Yinqian Zhang, Kehuan Zhang. Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections. (NDSS’18)
Zhe Zhou, Di Tang, Wenhao Wang, Xiaofeng Wang, Zhou Li, Kehuan Zhang. Anonymous Fingerprinting of Device Screens for Off-line Payment Protection. (ACSAC’18)
[Xiaolong Bai, Zhe Zhou,] XiaoFeng Wang, Zhou Li, Xianghang Mi, Nan Zhang, Tongxin Li, Shi-Min Hu, and Kehuan Zhang. Picking Up My Tab: Understanding and Mitigating Synchronized Token Lifting and Spending in Mobile Payment. (Usenix Security’17)
Zhe Zhou, Zhou Li, Kehuan Zhang. All Your VMs are Disconnected: Attacking Hardware Virtualized Network. (CODASPY’17)
Zhe Zhou, Wenrui Diao, Xiangyu Liu, Zhou Li, Kehuan Zhang, and Rui Liu. Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU. (PETS’17)
Yannan Liu, Lingxiao Wei, Zhe Zhou, Kehuan Zhang, Wenyuan Xu, and Qiang Xu. On Code Execution Tracking via Power Side-Channel. (CCS’16)
Zhe Zhou, Tao Zhang, Sherman S.M. Chow, Yupeng Zhang, and Kehuan Zhang. Efficient Authenticated Multi-Pattern Matching. (ASIACCS’16)
Tao Zhang, Sherman Chow, Zhe Zhou, Ming Li. Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization. (IWSEC’16)
Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, and Kehuan Zhang. When Good Becomes Evil: Keystroke Inference with Smartwatch. (CCS’15)
Wenrui Diao, Xiangyu Liu, Zhe Zhou, Kehuan Zhang, and Zhou Li. Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections. (ESORICS’15)
Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, and Kehuan Zhang. An Empirical Study on Android for Saving Non-shared Data on Public Storage. (IFIP SEC’15)
Zhe Zhou, Wenrui Diao, Xiangyu Liu, and Kehuan Zhang. Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound. (CCS’14)
Wenrui Diao, Xiangyu Liu, Zhe Zhou, and Kehuan Zhang. Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone. (SPSM’14)