Picture for Zihao Zhan

Zihao Zhan

GAZEploit: Remote Keystroke Inference Attack by Gaze Estimation from Avatar Views in VR/MR Devices

Add code
Sep 12, 2024
Figure 1 for GAZEploit: Remote Keystroke Inference Attack by Gaze Estimation from Avatar Views in VR/MR Devices
Figure 2 for GAZEploit: Remote Keystroke Inference Attack by Gaze Estimation from Avatar Views in VR/MR Devices
Figure 3 for GAZEploit: Remote Keystroke Inference Attack by Gaze Estimation from Avatar Views in VR/MR Devices
Figure 4 for GAZEploit: Remote Keystroke Inference Attack by Gaze Estimation from Avatar Views in VR/MR Devices
Viaarxiv icon

VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger

Add code
Feb 18, 2024
Figure 1 for VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger
Figure 2 for VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger
Figure 3 for VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger
Figure 4 for VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger
Viaarxiv icon

Programmable EM Sensor Array for Golden-Model Free Run-time Trojan Detection and Localization

Add code
Jan 22, 2024
Figure 1 for Programmable EM Sensor Array for Golden-Model Free Run-time Trojan Detection and Localization
Figure 2 for Programmable EM Sensor Array for Golden-Model Free Run-time Trojan Detection and Localization
Figure 3 for Programmable EM Sensor Array for Golden-Model Free Run-time Trojan Detection and Localization
Figure 4 for Programmable EM Sensor Array for Golden-Model Free Run-time Trojan Detection and Localization
Viaarxiv icon