Yi Xu
Yi Xu
Verified email at cs.unc.edu - Homepage
Title
Cited by
Cited by
Year
Seeing double: Reconstructing obscured typed input from repeated compromising reflections
Y Xu, J Heinly, AM White, F Monrose, JM Frahm
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
722013
Virtual u: Defeating face liveness detection by building virtual models from your public photos
Y Xu, T Price, JM Frahm, F Monrose
25th {USENIX} Security Symposium ({USENIX} Security 16), 497-512, 2016
672016
Security and usability challenges of moving-object captchas: Decoding codewords in motion
Y Xu, G Reynaga, S Chiasson, JM Frahm, F Monrose, P Van Oorschot
21st {USENIX} Security Symposium ({USENIX} Security 12), 49-64, 2012
622012
Security analysis and related usability of motion-based captchas: Decoding codewords in motion
Y Xu, G Reynaga, S Chiasson, JM Frahm, F Monrose, PC Van Oorschot
IEEE transactions on dependable and secure computing 11 (5), 480-493, 2013
322013
Watching the watchers: Automatically inferring tv content from outdoor light effusions
Y Xu, JM Frahm, F Monrose
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
192014
True Price, Jan-Michael Frahm, and Fabian Monrose. 2016. Virtual U: Defeating face liveness detection by building virtual models from your public photos
Y Xu
25th USENIX Security Symposium (USENIX Security 16). USENIX Association …, 0
10
On the privacy risks of virtual keyboards: automatic reconstruction of typed input from compromising reflections
R Raguram, AM White, Y Xu, JM Frahm, P Georgel, F Monrose
IEEE Transactions on Dependable and Secure Computing 10 (3), 154-167, 2013
92013
ROME: rateless online MDS code for wireless data broadcasting
N He, Y Xu, J Cao, Z Li, H Chen, Y Ren
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
72010
Caught Red-Handed: Toward Practical Video-Based Subsequences Matching in the Presence of Real-World Transformations.
Y Xu, T Price, F Monrose, JM Frahm
CVPR Workshops, 1397-1406, 2017
22017
Toward Robust Video Event Detection and Retrieval Under Adversarial Constraints
Y Xu
2016
The system can't perform the operation now. Try again later.
Articles 1–10