冀曉宇

冀曉宇

冀曉宇,男,博士,浙江大學電氣學院副教授,博導。

基本介紹

  • 中文名:冀曉宇
  • 畢業院校:香港科技大學
  • 學位/學歷:博士
  • 職業:教師
  • 專業方向:物聯網安全、智慧型電網安全、移動感知安全及隱私
  • 任職院校:浙江大學電氣工程學院
研究方向,人物經歷,主講課程,榮譽獎項,學術成果,會議論文,期刊論文,研究成果,發明專利,

研究方向

  • 物聯網安全、智慧型電網安全、移動感知安全及隱私

人物經歷

2017.01-至今:副教授,電氣工程學院,浙江大學
2015.09-2016.12:研究員,華為香港研究院
2010.09-2015.07:博士,香港科技大學計算機系
2006.09-2010.06:本科,電子信息技術及儀器,浙江大學

主講課程

  1. 《無線網路安全及隱私》, 研究生專業學位課,秋冬學期
  2. 《先進控制技術講座-電力系統新技術》(秋),自動化系本科生,32 學時(65人)
  3. 《物聯網安全》(籌劃),本科生,依託教育部精品課程計畫

榮譽獎項

2017 年度“浙江大學十大學術進展”
2018 ACM CCS最佳會議論文獎(國內首次,審稿分數第二)
2018 ACM AsiaCCS最佳會議論文獎(審稿分數第一)
2017 IEEE ICPADS WST Workshop最佳論文候選
2017 Freebuf-WitAwards“年度最佳安全團隊”
2014 IEEE Trustcom最佳會議論文獎
2011-2015香港政府獎學金(HKPF)

學術成果

會議論文

  1. -Yushi Cheng,Xiaoyu Ji*, Tianyang Lu and Wenyuan Xu, 'DeWiCam: Detecting Hidden Wireless Cameras via Smartphones', inACM Asia Conference on Computer and Communications Security (ASIACCS)2018. (acceptance ratio: 20%) (Best Paper Award)
  2. -Zhou Zhuang,Xiaoyu Ji*, Taimin Zhang, Juchuan Zhang, Zhenhua Li, Yunhao Liu, Wenyuan Xu, 'FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting', inACM Asia Conference on Computer and Communications Security (ASIACCS)2018. (acceptance ratio: 20%)
  3. -Chaohao Li,Xiaoyu Ji*, Xinyan Zhou, Juchuan Zhang, Jing Tian, Yanmiao Zhang and Wenyuan Xu, 'HlcAuth: Key-free and Secure Communications via Home-Limited Channel', inACM Asia Conference on Computer and Communications Security (ASIACCS)2018. (acceptance ratio: 20%)
  4. -Yushi Cheng,Xiaoyu Ji*, Xinyan Zhou and Wenyuan Xu, 'HomeSpy: Inferring User Presence via Encrypted Traffic of Home Surveillance Camera', The1st International Workshop on Wireless Sensing Technology (ICPASDS WST), 2018. (acceptance ratio: 18%) (Best Paper Runner-up Award)
  5. -Xiaopeng Li, Sharaf Malebary, Xianshan Qu,Xiaoyu Ji, Yushi Cheng, and Wenyuan Xu, 'iCare: Automatic and User-friendly Children Identification on Smartphones', InThe 19th International Workshop on Mobile Computing Systems and Applications(HotMobile), 2018. (acceptance ratio: 18%)[PDF] [Slides] [Bibtex]
  6. -Guoming Zhang, Chen Yan,Xiaoyu Ji*, Tianchen Zhang, Taimin Zhang and Wenyuan Xu*, 'DolphinAttack: Inaudible Voice Commands', In theProceeding of ACM Conference on Computer and Communications Security(CCS), 2017. (acceptance ratio: 18%) (*Corresponding author) (Best Paper Award, 國內首次)[PDF] [Slides] [Bibtex]
  7. -Hao Pan, Yi-Chao Chen, Guangtao Xue andXiaoyu Ji, 'MagneComm: Magnetometer-based Near-Field Communication', In theProceeding of ACM Annual International Conference on Mobile Computing and Networking(MobiCom), 2017. (acceptance ratio: 19.4%)[PDF] [Slides] [Bibtex]
  8. -Xiaoyu Ji, Jiliang Wang, Mingyan Liu, Yubo Yan, Panlong Yang, and Yunhao Liu, 'Hitchhike: Riding Control on Preambles', In theProceeding of IEEE Conference on Computer Communications(INFOCOM), 2014. (acceptance ratio: 19.4%) [PDF] [Slides] [Bibtex]
  9. -Xiaoyu Ji, Yuan He, Jiliang Wang, Wei Dong, Xiaopei Wu, and Yunhao Liu, 'Walking down the STAIRS: Efficient Collision Resolution in Wireless Sensor Networks', In theProceeding of IEEE Conference on Computer Communications(INFOCOM), 2014. (acceptance Rate: 19.4%) [PDF] [Slides] [Bibtex]
  10. -Xiaoyu Ji, Yuan He, Jiliang Wang, Kaishun Wu, Ke Yi, and Yunhao Liu, 'Voice over the Dins: Improving Wireless Channel Utilization with Collision Tolerance', In theProceedings of IEEE International Conference on Network Protocols(ICNP), 2013. (acceptance ratio: 18%) [PDF] [Slides] [Vedio] [Bibtex]
  11. -Yi Zhang, Jiliang Wang,Xiaoyu Ji, Daibo Li and Bo Li, 'Furion: Towards Energy-Efficient WiFi Offloading under Link Dynamics',In theProceedings of IEEE International Conference on Sensing, Communication and Networking (SECON), 2016.
  12. -Zhuangdi Zhu, Hao Pan, Yi-Chao Chen,Xiaoyu Ji, Fan Zhang, Chuang-Wen You, 'MagAttack: Remote App Sensing with Your Phone' . In ACM Ubicomp/ISWC 2016 Poster.
  13. -Daibo Liu, Mengshu Hou, Zhichao Cao, Yuan He,Xiaoyu Ji, and Xiaolong Zheng, 'COF: Exploiting Concurrency for Low Power Opportunistic Forwarding', In theProceedings of IEEE International Conference on Network Protocols(ICNP), 2015.
  14. -Daibo Liu, Zhichao Cao, Xiaopei Wu, Yuan He,Xiaoyu Jiand Mengshu Hou, 'TeleAdjusting: Using Path Coding and Opportunistic Forwarding for Remote Control in WSNs', In theProceeding ofIEEE International Conference on Distributed Computing Systems(ICDCS), 2015.
  15. -Weixi Gu, Zheng Yang, Longfei Shangguan,Xiaoyu Ji, and Yiyang Zhao, 'ToAuth: Towards Automatic Near Field Authentication for Smartphones', In theProceedings of IEEE International Conference on Trust, Security, and Privacy in Coumputing and Communications(TrustCom), 2014. (Best Paper Award)

期刊論文

  1. -Xiaoyu Ji, Yuan He, Jiliang Wang, Kaishun Wu, Daibo Liu, Ke Yi, and Yunhao Liu, 'On Improving Wireless Channel Utilization: A Collision Tolerance-based Approach',IEEE Transactions on Mobile Computing (TMC), accepted. 優秀期刊
  2. -Xiaoyu Ji, Jiliang Wang, Mingyan Liu, Yubo Yan, Panlong Yang, and Yunhao Liu,'Hitchhike: A Preamble-based Control Plane for SNR-sensitive Wireless Networks', IEEE Transactions on Wireless Communications (TWC), accepted.優秀期刊
  3. -Xiaoyu Ji, Yushi Cheng, Wenyuan Xu, and Xinyan Zhou, 'User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes', Accepted, Security and Communication Networks, 2018
  4. -Wenyuan Xu, Chen Yan, Weibin Jia,Xiaoyu Ji*, Jianhao Liu, 'Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles', Accepted, IEEE Internet of Things Journal (Early Access), 2018. 優秀期刊,JCR 一區,IF=5.82.(*Corresponding author)
  5. -Xinyan Zhou,Xiaoyu Ji*, Bin Wang, Yushi Cheng, Zhuoran Ma, Francis Choi, Brian Helmuth and Wenyuan Xu, 'Pido: Predictive Delay Optimization for Intertidal Wireless Sensor Networks', inSensors (IF=2.677), accepted.(*Corresponding author)
  6. -Xinyan Zhou,Xiaoyu Ji*, Yi-Chao Chen, Xiaopeng Li and Wenyuan Xu, 'LESS: Link Estimation with Sparse Sampling in Intertidal WSNs', inSensors (IF=2.677), accepted. (*Corresponding author)
  7. -Xiaohan Lai,Xiaoyu Ji*, Xinyan Zhou and Longdao Chen, 'Energy Efficient Link-Delay Aware Routing in Wireless Sensor Networks', IEEESensors Journal(IF=2.512), accepted. (*Corresponding author)
  8. -Wei Gong, Haoxiang Liu, Jiangchuan Liu, Xiaoyi Fan, Kebin Liu, Qiang Ma andXiaoyu Ji, 'Channel-Aware Rate Adaptation for Backscatter Networks', IEEE Transactions on Networking, accepted.優秀期刊
  9. -Xi Chen, Xiaopei Wu, Xiangyang Li,Xiaoyu Ji, Yuan He and Yunhao Liu, 'Privacy-aware High-quality Map Generation with Participatory Sensing',IEEE Transactions on Mobile Computing(TMC), accepted.優秀期刊

研究成果

Project 1:DolphinAttack
Dolphinattack modulates voice commands on ultrasonic carriers (e.g., f >20 kHz) to achieve inaudibility. By leveraging the nonlinearity of the microphone circuits, the modulated low frequency audio commands can be successfully demodulated, recovered, and more importantly interpreted by the speech recognition systems. We validate DolphinAttack on popular speech recognition systems, including Siri, Google Now, Samsung S Voice, Huawei, HiVoice, Cortana and Alexa. By injecting a sequence of inaudible voice commands, we show a few proof-of-concept attacks, which include activating Siri to initiate a FaceTime call on iPhone, activating Google Now to switch the phone to the airplane mode, and even manipulating the navigation system in an Aud automobile.
Project 2: Dewicam
Wireless cameras are widely deployed in surveillance systems for security guarding. However, the privacy concerns associated withunauthorized videotaping, are drawing an increasing attention recently. Existing detection methods for unauthorized wireless cameras are either limited by their detection accuracy or requiring dedicated devices. In this paper, we propose DeWiCam , a lightweight and effective detection mechanism using smartphones. The basic idea of DeWiCam is to utilize the intrinsic traffic patterns of flows from wireless cameras. Compared with traditional traffic pattern analysis, DeWiCam is more challenging because it cannot access the encrypted information in the data packets. We implement DeWiCam on the Android platform and evaluate it with extensive experiments on 20 cameras. The evaluation results show that DeWiCam can detect cameras with an accuracy of 99% within 2.7 s.
Project 3: Haking the Eye of Tesla
To improve road safety and driving experiences, autonomous vehicles have emerged recently, and they can sense their surroundings and navigate without human intervention. Although promising and improving safety features, the trustworthiness of these cars has to be examined before they can be widely adopted on the road. Unlike traditional network security, autonomous vehicles rely heavily on their sensory ability of their surroundings to make driving decision, which makes sensors an interface for attacks. Thus, in this project we examine the security of the sensors of autonomous vehicles, and investigate the trustworthiness of the eyes of the cars.
Project 4: iCare
With the proliferation of smartphones, children often use the same smartphones of their parents to play games or surf Internet, and can potentially access kid-unfriendly content from the Internet jungle. A successful parent patrol strategy has to be user-friendly and privacy-aware. The apps that require explicit actions from parents may not be effective when parents forget to enable them, and the ones that use built-in cameras to detect children may impose privacy violations. We propose iCare, which can identify child users automati- cally and seamlessly as users operate smartphones. In particular, iCare investigates the intrinsic differences of screen-touch pat- terns between child and adult users. We discover that users’ touch behaviors depend on a user’s age. Thus, iCare records the touch behaviors and extracts hand-geometry and finger dexterity features that capture the age information.
Media Coverage:Xinhua News, Sohu Tech.,Zhejiang UniversityPress, Zhejiang News,etc.
Project 5:HlcAuth
We design a key-free communication method for such devices in a smart home. In particular, we introduce the Home-limited Channel (HLC) that can be accessed only within a house yet inaccessible for an outside-house attacker. Utilizing HLCs, we propose a challenge-response mechanism to authenticate the communications between smart devices without key—HlcAuth. The advantages of HlcAuth are low cost, lightweight as well as key-free, and requiring no human intervention. lcAuth can defeat replay attacks, message-forgery attacks, and man-in-the-middle (MiTM) attacks, among others.
Project 6:FBSleuth
Fake base station (FBS) crime is one typical kind of wireless communication crime which has risen in recent years. The key to enforce the laws on regulating FBS based crime is not only to arrest but also to convict criminals efficiently. To fill in the gap of enforcing the laws on FBS crimes, we design FBSleuth, a FBS crime forensics framework utilizing radio frequency (RF) fingerprints, e.g., the unique characteristics of the FBS transmitters embedded in the electromagnetic signals. In essence, such fingerprints stem from the imperfections of hardware manufacturing and thus represent a consistent bond between an individual FBS device and its committed crime.

發明專利

  1. 冀曉宇,劉俊宏,何源,王繼良,劉雲浩,一種基於相長干涉的無線網路傳輸的衝突解決方法與系統, 發明專利, 授權, CN102970737B, 2016-04-20
  2. 冀曉宇,劉雲浩,王繼良,何源, 基於前導碼的控制信令傳輸方法, 發明專利, 授權, CN103684697B, 2017-03-01
  3. 冀曉宇,劉雲浩,何源,王繼良, 數據包傳輸方法及通信節點, 發明專利, 授權, CN103747480B, 2017-11-20
  4. 冀曉宇,徐文淵,程雨詩,一種基於CPU模組電磁輻射的設備指紋提取和認證方法,受理,2018102992781
  5. 徐文淵,冀曉宇,張國明,莊周,周欣妍,張天晨,一種基於非線性作用的聲波通信方法,受理,201810462977.3
  6. 徐文淵,冀曉宇,張國明,閆琛,張天晨,張泰民,基於機器學習的防禦無聲指令控制語音助手的方法,受理,2017113746682

相關詞條

熱門詞條

聯絡我們