Home > PeopleFaculty

Ji Xiaoyu5ae6be9158a15.jpg

Assistant Professor

Research Interests: network and system security, cross-layer network protocol design

Contact Information:

Email: xji@ zju.edu.cn

Research Lab: USSLAB

[CV]    Google Scholar Citations 


I am leading Ubiquitous System Security Lab (USSLAB) with Prof. Wenyuan Xu. I joined the department of Electrical Engineering in Zhejiang University as an assistant professor in 2016.

I received my Ph.D. degree from the Department of Computer Science and Engineering of Hong Kong University of Science and Technology (HKUST). supervised by Prof. Yunhao Liu and Ke Yi. I obtained my Bachelor degree in Department of Electronic Information Technology and Instrument Science  from Zhejiang University in 2010.


Conference Papers:

  • Yushi Cheng, Xiaoyu Ji*, Tianyang Lu and Wenyuan Xu, "DeWiCam: Detecting Hidden Wireless Cameras via Smartphones", in ACM Asia Conference on Computer and Communications Security (ASIACCS) 2018. (acceptance ratio: 20%)

  • Zhou Zhuang, Xiaoyu Ji*, Taimin Zhang, Juchuan Zhang, Zhenhua Li, Yunhao Liu, Wenyuan Xu, "FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting", in ACM Asia Conference on Computer and Communications Security (ASIACCS) 2018. (acceptance ratio: 20%)

  • Chaohao Li, Xiaoyu Ji*, Xinyan Zhou, Juchuan Zhang, Jing Tian, Yanmiao Zhang and Wenyuan Xu, "HlcAuth: Key-free and Secure Communications via Home-Limited Channel", in ACM Asia Conference on Computer and Communications Security (ASIACCS) 2018. (acceptance ratio: 20%)

  • Yushi Cheng, Xiaoyu Ji*, Xinyan Zhou and Wenyuan Xu, "HomeSpy: Inferring User Presence via Encrypted Traf?c of Home Surveillance Camera", The 1st International Workshop on Wireless Sensing Technology (ICPASDS WST) , 2018. (acceptance ratio: 18%)   (Best Paper Runner-up Award)

  • Xiaopeng Li, Sharaf Malebary, Xianshan Qu, Xiaoyu Ji, Yushi Cheng, and Wenyuan Xu, "iCare: Automatic and User-friendly Children Identification on Smartphones", In The 19th International Workshop on Mobile Computing Systems and Applications (HotMobile), 2018. (acceptance ratio: 18%)  

  • Guoming Zhang, Chen Yan, Xiaoyu Ji*, Tianchen Zhang, Taimin Zhang and Wenyuan Xu*, "DolphinAttack: Inaudible Voice Commands", In the Proceeding of ACM Conference on Computer and Communications Security (CCS), 2017. (acceptance ratio: 18%)  (*Corresponding author) (Best Paper Award) [PDF] [Slides] [Bibtex]

  • Hao Pan, Yi-Chao Chen, Guangtao Xue and Xiaoyu Ji, "MagneComm: Magnetometer-based Near-Field Communication", In the Proceeding of  ACM Annual International Conference on Mobile Computing and Networking (MobiCom), 2017. (acceptance ratio: 19.4%) [PDF] [Slides] [Bibtex]

  • Xiaoyu Ji, Jiliang Wang, Mingyan Liu, Yubo Yan, Panlong Yang, and Yunhao Liu, "Hitchhike: Riding Control on Preambles", In the Proceeding of IEEE Conference on Computer Communications (INFOCOM), 2014. (acceptance ratio: 19.4%) [PDF] [Slides] [Bibtex]

  • Xiaoyu Ji, Yuan He, Jiliang Wang, Wei Dong, Xiaopei Wu, and Yunhao Liu, "Walking down the STAIRS: Efficient Collision Resolution in Wireless Sensor Networks", In the Proceeding of IEEE Conference on Computer Communications (INFOCOM), 2014. (acceptance Rate: 19.4%) [PDF] [Slides] [Bibtex]

  • Xiaoyu Ji, Yuan He, Jiliang Wang, Kaishun Wu, Ke Yi, and Yunhao Liu, "Voice over the Dins: Improving Wireless Channel Utilization with Collision Tolerance", In the Proceedings of IEEE International Conference on Network Protocols (ICNP), 2013. (acceptance ratio: 18%) [PDF] [Slides] [Vedio] [Bibtex]

  • Yi Zhang, Jiliang Wang, Xiaoyu Ji, Daibo Li and Bo Li, "Furion: Towards Energy-Efficient WiFi Offloading under Link Dynamics",In the Proceedings of IEEE International Conference on Sensing, Communication and Networking (SECON), 2016.

  • Zhuangdi Zhu, Hao Pan, Yi-Chao Chen, Xiaoyu Ji, Fan Zhang, Chuang-Wen You, "MagAttack: Remote App Sensing with Your Phone" . In ACM Ubicomp/ISWC 2016 Poster.

  • Daibo Liu, Mengshu Hou, Zhichao Cao, Yuan He, Xiaoyu Ji, and Xiaolong Zheng, "COF: Exploiting Concurrency for Low Power Opportunistic Forwarding", In the Proceedings of IEEE International Conference on Network Protocols (ICNP), 2015.

  • Daibo Liu, Zhichao Cao, Xiaopei Wu, Yuan He, Xiaoyu Ji and Mengshu Hou, "TeleAdjusting: Using Path Coding and Opportunistic Forwarding for Remote Control in WSNs", In the Proceeding of  IEEE International Conference on Distributed Computing Systems (ICDCS), 2015. 

  • Weixi Gu, Zheng Yang, Longfei Shangguan, Xiaoyu Ji, and Yiyang Zhao, "ToAuth: Towards Automatic Near Field Authentication for Smartphones", In the Proceedings of IEEE International Conference on Trust, Security, and Privacy in Coumputing and Communications (TrustCom), 2014. (Best Paper Award)

  • Lining Yao, Yan Shi, Hengfeng Chi, Xiaoyu Ji, and Fangtian Ying, "Music-touch shoes: vibrotactile interface for hearing impaired dancers", In the Proceedings of International Conference on Tangible, Embedded, and Embodied Interaction (TEI), 2010.

Journal Papers:

  • Xiaoyu Ji, Yuan He, Jiliang Wang, Kaishun Wu, Daibo Liu, Ke Yi, and Yunhao Liu, "On Improving Wireless Channel Utilization: A Collision Tolerance-based Approach", IEEE Transactions on Mobile Computing (TMC), accepted [PDF] [Bibtex]

  • Xiaoyu Ji, Jiliang Wang, Mingyan Liu, Yubo Yan, Panlong Yang, and Yunhao Liu, "Hitchhike: A Preamble-based Control Plane for SNR-sensitive Wireless Networks", IEEE Transactions on Wireless Communications (TWC), accepted.  [PDF] [Bibtex]

  • Xinyan Zhou, Xiaoyu Ji*,Bin Wang, Yushi Cheng, Zhuoran Ma, Francis Choi, Brian Helmuth and Wenyuan Xu, "Pido: Predictive Delay Optimization for Intertidal Wireless Sensor Networks", in Sensors (IF=2.677), accepted. (*Corresponding author)

  • Xinyan Zhou, Xiaoyu Ji*, Yi-Chao Chen, Xiaopeng Li and Wenyuan Xu, "LESS: Link Estimation with Sparse Sampling in Intertidal WSNs", in Sensors (IF=2.677), accepted. (*Corresponding author)

  • Xiaohan Lai, Xiaoyu Ji*, Xinyan Zhou and Longdao Chen, "Energy Efficient Link-Delay Aware Routing in Wireless Sensor Networks", IEEE Sensors Journal (IF=2.512), accepted. (*Corresponding author)

  • Wei Gong, Haoxiang Liu, Jiangchuan Liu, Xiaoyi Fan, Kebin Liu, Qiang Ma and Xiaoyu Ji, "Channel-Aware Rate Adaptation for Backscatter Networks", IEEE Transactions on Networking, accepted.

  • Xi Chen, Xiaopei Wu, Xiangyang Li, Xiaoyu Ji, Yuan He and Yunhao Liu, "Privacy-aware High-quality Map Generation with Participatory Sensing", IEEE Transactions on Mobile Computing (TMC), accepted. [PDF] [Bibtex]

  • Xiaoyu Ji, Yuan He, Jiliang Wang, Wei Dong, Xiaopei Wu, Daibo Liu, and Yunhao Liu, "STAIRS: Diagnosing and Resolving Wireless Collision with Constructive Interference", submitted to IEEE Transactions on Mobile Computing (TMC).  [PDF] [Bibtex]

Research Projects

DolphinAttack: DolphinAttack, that modulates voice commands on ultrasonic carriers (e.g., f > 20 kHz) to achieve inaudibility. By leveraging the nonlinearity of the microphone circuits, the modulated low frequency audio commands can be successfully demodulated, recovered, and more importantly interpreted by the speech recognition systems. We validate DolphinAttack on popular speech recognition systems, including Siri, Google Now, Samsung S Voice, Huawei, HiVoice, Cortana and Alexa. By injecting a sequence of inaudible voice commands, we show a few proof-of-concept attacks, which include activating Siri to initiate a FaceTime call on iPhone, activating Google Now to switch the phone to the airplane mode, and even manipulating the navigation system in an Audi automobile. 

DeWiCam: Wireless cameras are widely deployed in surveillance systems for security guarding. However, the privacy concerns associated with unauthorized videotaping, are drawing an increasing attention re cently. Existing detection methods for unauthorized wireless cameras are either limited by their detection accuracy or requiring dedicated devices. In this paper, we propose DeWiCam, a lightweight and effective detection mechanism using smartphones. 

Haking the Eye of Tesla: To improve road safety and driving experiences, autonomous vehicles have emerged recently, and they can sense their surroundings and navigate without human intervention. Although promising and improving safety features, the trustworthiness of these cars has to be examined before they can be widely adopted on the road. Unlike traditional network security, autonomous vehicles rely heavily on their sensory ability of their surroundings to make driving decision, which makes sensors an interface for attacks. Thus, in this project we examine the security of the sensors of autonomous vehicles, and investigate the trustworthiness of the ‘eyes’ of the cars.

Cross-layer Protocol Design for WSNCitySee and GreenOrbsAn urban carbon dioxide monitoring system (1000+ sensor nodes), in which I designed and implemented a time-efficient protocol for collision resolution, designed a control plane based on preamble of data packets and analyzed the data collected from the sensor nodes to measure the system. A long-term wireless sensor network system in the vast forest (330 nodes). I designed and implemented a protocol for improving channel utilization with dedicated observation in PHY layer for wireless networks and conduct data analysis and network measurement based on the system.

Honors and Awards

  • ACM CCS Best Paper Award, 2017

  • IEEE ICPADS WST Workshop Best Paper Runner-up Award, 2017

  • IEEE TrustCom Best Paper Award, 2014

  • Hong Kong PhD Fellowship Scheme (HKPFS), granted by the Hong Kong government, 2011

  • Excellent Graduate Scholarship, Zhejiang University, June, 2010

© 2017 College of Electrical Engineering , Zhejiang University All rights reserved